End the endpoint security breaches

Many companies do a good job of protecting their perimeter. They install firewalls to keep the bad guys out of their corporate network. They use anti-virus software and intrusion detection. But with the

Share on LinkedIn Share with Google+ Comment on this article Published on: March 6th, 2008 Vawn Himmelsbach

New endpoint protection products prevent data theft

Enterprise IT administrators didn't need the recent stories about large-scale data breaches at TJX Co. (network compromise potentially exposing credit data on hundreds of thousands of customers) or Canadian Imperial Bank of Commerce

Share on LinkedIn Share with Google+ Comment on this article Published on: January 28th, 2007 Paul F. Roberts

IT gets new arsenal to fight data threats

COMMENT ON THIS ARTICLEEnterprise IT administrators didn't need the recent stories about large-scale data breaches at TJX Co . (network compromise potentially exposing credit data on hundreds of thousands of customers) or Canadian

Share on LinkedIn Share with Google+ Comment on this article Published on: January 25th, 2007 Paul F Roberts

Access control targets port precision

ConSentry is introducing a new product that incorporates its network access control hardware and software into an Ethernet switch, making it possible to enforce access policies on a port-by-port basis. Called CS4048 LANShield

Share on LinkedIn Share with Google+ Comment on this article Published on: May 11th, 2006 Tim Greene

Pressing interplay

Security for the enterprise comes in all shapes and sizes. Its moving parts are coordinated by a mechanism known as network access control, facilitating dialogue between network-based security devices and client anti-virus software.

Share on LinkedIn Share with Google+ Comment on this article Published on: March 16th, 2006 Mark Els