Security

Let's face it. Software has holes. And hackers love to exploit them. New vulnerabilities appear almost daily. If you have software - we all do - you need to keep tabs on the latest vulnerabilities.

Featured videos

Articles about Security

Equipment reassignment checklist

Equipment reassignment checklist

Reclaiming and reusing equipment helps you get the maximum value out of your IT investments—as long as you follow a standardized procedure to ensure that equipment is safe to reassign. This checklist will...

from Tech Pro Research

BlackBerry's DTEK50 fails to raise the security bar

BlackBerry's DTEK50

BlackBerry's newest phone is a passable for its price, but its misguided effort to promote its security as something bar-raising will not stand the test of time.

August 15, 2016 by in Security

Acronis vmProtect 6

Acronis vmProtect 6

An ideal backup tool for small businesses and larger enterprises alike, vmProtect 6 makes light work of protecting and rapidly recovering virtual machines on VMware vSphere hosts.

January 23, 2012 by in Security

SonicWALL TZ 210

SonicWALL TZ 210

SonicWALL's feature-packed TZ 210 gateway security appliance is capable of protecting all kinds of networks at a very affordable price. It's easy to setup and manage, and sets a new price point in the UTM market.

October 15, 2009 by in Security

PC Tools Desktop Maestro 3.0

PC Tools Desktop Maestro 3.0

As a tool for cleaning an untidy Windows registry, PC Tools Desktop Maestro seems to do a good job, and combines this ability with excellent privacy tools. However, users of Windows Vista may find Desktop Maestro being blocked by User Account Control.

August 21, 2008 by in Security

Most Popular