Skip navigation

Security - 23 Aug 2005

Peace of Mind in a Box

Guarding your networks and systems from the latest threats isn't easy. Fortunately, security products are available to help. These products take many forms—antivirus and antispyware solutions, firewalls and Web access control solutions, Intrusion Prevention Systems (IPSs) and vulnerability scanners, authentication mechanisms—and many perform multiple security functions. As new threats emerge, security vendors step up to the challenge, adding new products or new features to existing products to fight the new battles (witness the number of spyware tools that have been introduced this year). You can find many old favorites and some new names among this year's Readers' Choice Security winners.


SECURITY

Antivirus/File Server or Client
1st—McAfee VirusScan Enterprise
http://www.mcafee.com
2nd—Symantec and Norton antivirus products
http://www.symantec.com
3rd—Trend Micro OfficeScan
http://www.trendmicro.com

Antivirus/Mail Server
1st—Trend Micro ScanMail for Microsoft Exchange
http://www.trendmicro.com
2nd—McAfee GroupShield for Microsoft Exchange
http://www.mcafee.com
3rd—Eset NOD32
http://www.eset.com

Spyware Blocker
1st—Sunbelt Software CounterSpy Enterprise
http://www.sunbeltsoftware.com
2nd—Zone Labs (a Check Point Company) ZoneAlarm Pro
http://www.zonelabs.com
3rd—Microsoft Windows Antispyware
http://www.microsoft.com

Firewall/Server or Standalone
1st—Check Point Software Technologies Check Point VPN-1 Pro
http://www.checkpoint.com
2nd—WatchGuard Technologies Firebox Series
http://www.watchguard.com
3rd—Fortinet FortiGate Antivirus Firewalls
http://www.fortinet.com

Firewall/Desktop
1st—Zone Labs (a Check Point Company) ZoneAlarm
http://www.zonelabs.com
2nd—Check Point Software Technologies Check Point Integrity SecureClient
http://www.checkpoint.com
3rd—McAfee Desktop Firewall
http://www.mcafee.com

Proxy Server/Web Access Control and Monitoring
1st—Websense Enterprise
http://www.websense.com
2nd—Pearl Software Pearl Echo
http://www.pearlsoftware.com
3rd—Microsoft ISA Server
http://www.microsoft.com

Intrusion Detection and Prevention
1st—eEye Digital Security Blink
http://www.eeye.com
2nd—NetIQ Security Manager
http://www.netiq.com
3rd—Check Point Software Technologies InterSpect
http://www.checkpoint.com
3rd—McAfee IntruShield
http://www.mcafee.com

Vulnerability Scanner
1st—Sunbelt Software Sunbelt Network Security Inspector
http://www.sunbeltsoftware.com
2nd—eEye Digital Security Retina Network Security Scanner
http://www.eeye.com
3rd—GFI Software GFI LANguard Network Security Scanner
http://www.gfi.com

Password-Management Software
1st—RSA Security RSA Sign-On Manager
http://www.rsasecurity.com
2nd—Citrix Systems Citrix Password Manager
http://www.citrix.com
3rd—HP OpenView Identity Management
http://www.hp.com

Authentication Solution (Two-Factor/Nonbiometric)
1st—RSA Security RSA SecurID
http://www.rsasecurity.com
2nd—SSH Communications Security SSH Tectia
http://www.ssh.com
3rd—WinMagic SecureDoc Disk Encryption
http://www.winmagic.com

Authentication Solution (Biometric)
1st—Lenel Systems International OnGuard ID CredentialCenter
http://www.lenel.com


Hide comments

Comments

  • Allowed HTML tags: <em> <strong> <blockquote> <br> <p>

Plain text

  • No HTML tags allowed.
  • Web page addresses and e-mail addresses turn into links automatically.
  • Lines and paragraphs break automatically.
Publish