Shopping Cart: A survey of security software

Product Name: Centennial Software DeviceWall Content Aware Edition

Features:

• Prevents unwanted transfer of data to or from USB memory sticks, portable hard drives, smart phones and MP3 players

• User access can be blocked, limited to read-only or unlimited

• Can encrypt all data transferred to external devices

• Records individual device connections and the most popular files accessed on portable devices

• Identifies true file types, even if the user has renamed the files or changed the filename extensions

System Requirements:

• Server requires: Pentium Class processor;

? 128 MB of RAM; 512 MB of hard disk space;

? Windows 2000, XP or 2003 (32-bit editions)

? Domain-based network, Apache Web Server or Microsoft IIS 5.0

• Client requires: Windows 2000 (service pack 4), XP or 2003

Price: $43 per managed device

Product Name: Entrust IdentityGuard 9.0

Features:

• Authentication options include user name and password, IP geolocation, machine/device, questions and answers, out of band one-time password (delivered via voice, SMS or e-mail), grid cards, one-time password tokens.

• Companies can choose how they want their users to authenticate, based on user type, risk assessment and the application being used

• Can be accessed remotely or by Windows desktop and applications deployed on the extranet

• Authenticators administered through one Web-based console

System Requirements:

• Works on a variety of systems, including IBM and BEA application services

Price: US$8 per user for one license, with discounts for buying large quantitites. Average selling price is US$1.40 per user.

Product Name: NetOp Process Control

Features:

• Uses a white list to decide which programs and processes are allowed to run on each PC on the network

• Assigns individual rights to each PC so different employees have access to the applications and Internet tools they need to do their jobs.

• Acts as a supplement to installed firewalls and virus protection

• Checks the integrity of applications attempting to communicate with a PC and notifies administrators if applications have been modified

• Hides computers ports to prevent attacks and port scans

System Requirements

• Intel Pentium 233 MHz or higher

• RAM: 32 MB plus operating system requirement

• 10 MB of hard disk space

• Windows Vista, XP or 2000 professional edition

• At least one network adapter

Pricing not provided

Would you recommend this article?

Share

Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.


Jim Love, Chief Content Officer, IT World Canada

Featured Download

Featured Articles

Cybersecurity in 2024: Priorities and challenges for Canadian organizations 

By Derek Manky As predictions for 2024 point to the continued expansion...

Survey shows generative AI is a top priority for Canadian corporate leaders.

Leaders are devoting significant budget to generative AI for 2024 Canadian corporate...

Related Tech News

Tech Jobs

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

Tech Companies Hiring Right Now