Security

Let's face it. Software has holes. And hackers love to exploit them. New vulnerabilities appear almost daily. If you have software - we all do - you need to keep tabs on the latest vulnerabilities.

Featured videos

Articles about Security

Intrusion detection policy

Intrusion detection policy

A clear and concise plan of action will help counteract any intrusion into an enterprise network and mitigate potential damage. This sample policy establishes guidelines and procedures your organization...

from Tech Pro Research

Network Box SME 250

Network Box SME 250

Network Box combines all that’s good in a managed security service with an affordable, locally installed and monitored appliance -- a winning combination for companies with limited resources.

February 13, 2006 by in Security

MailFrontier Gateway Appliance M500

MailFrontier Gateway Appliance M500

The main selling point of the MailFrontier Gateway Appliance is its delightfully straightforward management interface. The hardware and software are both well specified, and can provide a high level of protection against common mail-borne security threats.

December 21, 2005 by in Security

ZyXEL ZyWALL 35 UTM

ZyXEL ZyWALL 35 UTM

The ZyWALL 35 UTM appliance combines all the basic security tools required to protect a small business network, and deploys them at the Internet gateway where they are most useful. Professional help with deployment may be required, however, and it doesn’t do away entirely with the need for desktop and server-side protection.

November 24, 2005 by in Security

Check Point Connectra 2.0

Check Point Connectra 2.0

Check Point's Connectra 2.0 compares well on functionality and price with other enterprise-level SSL VPN solutions, with the added bonus of application and new endpoint security features.

October 9, 2005 by in Security

LG F1200

LG F1200

LG's mid-range musical phone features dual colour displays and tri-band connectivity, but it lacks memory expansion options.

October 4, 2005 by in Mobility

Blue Coat Spyware Interceptor

Blue Coat Spyware Interceptor

Simple to deploy and easy to manage, the Blue Coat Spyware Interceptor is a cost-effective way of identifying and blocking spyware infections without the need to configure and manage software on individual client PCs.

September 12, 2005 by in Security

Spyware Doctor 3.2

Spyware Doctor 3.2

With its quick scanning and multiple tools for stopping malware before it infects your computer, Spyware Doctor is a solid spyware remover.

August 15, 2005 by in Security

ISS Proventia M10

ISS Proventia M10

The Proventia M10 appliance provides impressive and comprehensive network security at a surprisingly affordable price. However, it’s not as easy to deploy and manage as some of the alternatives and, as such, may not meet all small business requirements.

July 26, 2005 by in Security

Nokia 6230i

Nokia 6230i

Nokia's 6230i is an upgraded version of its classic, unpretentious 6230 with a higher quality screen, 1.3-megapixel camera and Bluetooth.

July 11, 2005 by in Microsoft

Samsung D500

Samsung D500

Samsung's latest slider phone, the D500, looks a lot like its sliding predecessor, but comes in a black case with a megapixel camera and an MP3 player.

April 25, 2005 by in Samsung

Most Popular