Encryption has been around for many years, and the need for it is becoming clearer all the time. Yet it still isn't widely used. Could encryption's problem be that it's too difficult for users to use and IT...
It seems like every vendor has a network access control (NAC) product or framework these days. You might be wondering, "Just what is NAC and what types of products can help me control which clients have access to my...
A signature-based antivirus solution will catch the majority of viruses, but it won't catch everything. Consequently, some companies use antivirus products from more than one vendor, or they might choose one product...
What do you get when you cross government grants with some engineering students at an Ivy League university? CounterStorm, a company formed to "productize" security technologies developed under grants from the Defense...
Imagine knowing where your company's laptops are at all times. Imagine being able to push OS and application patches down to them and back them up to the network during the night—when they're not even on. Imagine...
Check Point Software Technologies is moving into the data security market and enhancing its core network security product line after its recent acquisitions of Protect Data (which owns Pointsec) and NFR Security...