Information Security Leader, Author, Instructor and Speaker

Default utility Image

Authentication: MXI Security’s Stealth MXP TAGS: | MXI Security’s Stealth MXP token combines a three-factor remote authentication solution along with two-factor portable encrypted storage in a single …Continue reading →

Default utility Image

Document Review: Document Detective 2.0 TAGS: | It’s tough enough for security personnel to review every outgoing document for sensitive information– whether it’s a pharmaceutical company’s latest …Continue reading →

Default utility Image

Configuration Management: Configuresoft’s Enterprise Configuration Manager v4.7 TAGS: | Configuresoft’s Enterprise Configuration Manager (ECM) v4.5 and were impressed with the system’s ability to aggregate Windows system configuration information, remediate …Continue reading →

Default utility Image

Hot Pick: SecureWave’s Sanctuary Device Control 3.0.1 TAGS: | It’s your company’s equipment and your company’s intellectual property. If you don’t want employees treating either as if it were …Continue reading →

Default utility Image

Review: Hercules 4.0 provides ample control over vulnerabilities TAGS: | Citadel’s Hercules 4.0 Enterprise Vulnerability Management Suite meets enterprise demand for integrated security tools by providing comprehensive control over the …Continue reading →

Default utility Image

Hot Pick: Hercules 4.0 Enterprise Vulnerability Management Suite TAGS: | Vulnerability Management Suite meets enterprise demand for integrated security tools by providing comprehensive control over the entire vulnerability management lifecycle. …Continue reading →

Default utility Image

Antispyware: Blue Coat Systems’ Spyware Interceptor SI-1 TAGS: | | Interceptor SI-1 is one of the first products to approach spyware from a network-based perspective, protecting devices behind the gateway–a …Continue reading →

Default utility Image

Sunbelt Software’s CounterSpy Enterprise 1.5 Product Review TAGS: | The swift emergence of spyware as a serious business problem has forced organizations to divert money and resources to address …Continue reading →

Default utility Image

Content Alarm 1.1 TAGS: | Information is the fuel of enterprises, and nearly every bit of that information-sensitive, restrictive and unclassified-is passed over network pipes. …Continue reading →

Default utility Image

Desktop Security: GreenBorder Enterprise Security TAGS: | | Enterprise Security Solution doesn’t detect anything; it protects Internet Explorer and Outlook users from themselves through a sandboxing technique that …Continue reading →