3 Key Computer Security Tools You Should Be Using

By Baselinemag  |  Posted 2006-05-17 Email Print this article Print
 
 
 
 
 
 
 

Security managers need cutting-edge technologies to get a 30,000-foot view of their operations—and to wage the ongoing battle against network attacks.

Security managers need cutting-edge technologies to get a 30,000-foot view of their operation—and to wage the ongoing battle against network attacks. Seven executives share their war stories. Plus, key product vendors are listed.

Story guide:
3 Key Security Tools: Introduction
Security managers need cutting-edge technologies to get a 30,000-foot view of their operations—and to wage the ongoing battle against network attacks. They include:

  • Tool 1. Security Information Management
    This software can help you paint a picture of your enterprise's overall security health and exposure. Plus, five key vendors and their customers.

  • Tool 2. End-Point Security
    Want to enforce corporate policies on desktop computers about what behavior is and isn't allowed? Start here. Plus, six key vendors and their customers.

  • Tool 3. Intrusion Prevention Systems
    These systems can help you proactively block network traffic without requiring manual intervention. Plus, six key vendors and their customers.


  •  
     
     
     
     
     
     
     
     
     

    Submit a Comment

    Loading Comments...

    Manage your Newsletters: Login   Register My Newsletters