Security

Let's face it. Software has holes. And hackers love to exploit them. New vulnerabilities appear almost daily. If you have software - we all do - you need to keep tabs on the latest vulnerabilities.

Featured videos

Articles about Security

Remote access policy

Remote access policy

This policy outlines guidelines and processes for requesting, obtaining, using, and terminating remote access to organization networks, systems, and data. It applies to scenarios where employees connect...

from Tech Pro Research

BlackBerry's DTEK50 fails to raise the security bar

BlackBerry's DTEK50

BlackBerry's newest phone is a passable for its price, but its misguided effort to promote its security as something bar-raising will not stand the test of time.

August 15, 2016 by in Security

Acronis vmProtect 6

Acronis vmProtect 6

An ideal backup tool for small businesses and larger enterprises alike, vmProtect 6 makes light work of protecting and rapidly recovering virtual machines on VMware vSphere hosts.

January 23, 2012 by in Security

SonicWALL TZ 210

SonicWALL TZ 210

SonicWALL's feature-packed TZ 210 gateway security appliance is capable of protecting all kinds of networks at a very affordable price. It's easy to setup and manage, and sets a new price point in the UTM market.

October 15, 2009 by in Security

PC Tools Desktop Maestro 3.0

PC Tools Desktop Maestro 3.0

As a tool for cleaning an untidy Windows registry, PC Tools Desktop Maestro seems to do a good job, and combines this ability with excellent privacy tools. However, users of Windows Vista may find Desktop Maestro being blocked by User Account Control.

August 21, 2008 by in Security

Most Popular