Monday, April 29, 2013Toronto firm boss calmer with No Panic Computing Prior to revamping its endpoint security arrangement, IFCG's constant concern was that it had no direct control over independent agents who used their own devices
Wednesday, January 30, 2013Kaspersky launches endpoint security tool Kaspersky Lab’s B2B security product offers single console for managing PC’s, virtual machines and mobile devices
Thursday, March 06, 2008End the endpoint security breaches Mobile devices and USB sticks offer portability, but also a lot of problems. Watch for these warning signs
Sunday, January 28, 2007New endpoint protection products prevent data theft Enterprise IT administrators didn't need the recent stories about large-scale data breaches at TJX Co. (network compromise potentially exposing credit data on hundreds of thousands of customers) or Canadian Imperial Bank of Commerce (lost hard drive with personal financial information on 470,000 mutual fund customers) or Nationwide Health Plans (backup tapes with data on 28,000 patients stolen from a lockbox) to convince them that data protection was an urgent problem in need of attention.
Thursday, January 25, 2007IT gets new arsenal to fight data threats On the heels of the TJX and CIBC security breaches, a crop of new products may finally give IT some weapons to address threats posed to the enterprise network.
Thursday, May 11, 2006Access control targets port precision ConSentry is introducing a new product that incorporates its network access control hardware and software into an Ethernet switch, making it possible to enforce access policies on a port-by-port basis.
Thursday, March 16, 2006Pressing interplay Security for the enterprise comes in all shapes and sizes. Its moving parts are coordinated by a mechanism known as network access control, facilitating dialogue between network-based security devices and client anti-virus software.