dcsimg
 
 

3 Key Computer Security Tools You Should Be Using

By Baselinemag  |  Posted 2006-05-17 Print this article Print
 
 
 
 
 

Security managers need cutting-edge technologies to get a 30,000-foot view of their operations—and to wage the ongoing battle against network attacks.

Security managers need cutting-edge technologies to get a 30,000-foot view of their operation—and to wage the ongoing battle against network attacks. Seven executives share their war stories. Plus, key product vendors are listed.

Story guide:
3 Key Security Tools: Introduction
Security managers need cutting-edge technologies to get a 30,000-foot view of their operations—and to wage the ongoing battle against network attacks. They include:

  • Tool 1. Security Information Management
    This software can help you paint a picture of your enterprise's overall security health and exposure. Plus, five key vendors and their customers.

  • Tool 2. End-Point Security
    Want to enforce corporate policies on desktop computers about what behavior is and isn't allowed? Start here. Plus, six key vendors and their customers.

  • Tool 3. Intrusion Prevention Systems
    These systems can help you proactively block network traffic without requiring manual intervention. Plus, six key vendors and their customers.


  •  
     
     
     
     
     
     
     
     
     
     
     
     
     
     

    Submit a Comment

    Loading Comments...
    eWeek eWeek

    Have the latest technology news and resources emailed to you everyday.

    By submitting your information, you agree that baselinemag.com may send you Baselinemag offers via email, phone and text message, as well as email offers about other products and services that Baselinemag believes may be of interest to you. Baselinemag will process your information in accordance with the Quinstreet Privacy Policy.

    Click for a full list of Newsletterssubmit