TRIAL SOFTWARE:
VigilEnt Policy Center is the most comprehensive solution for developing, implementing and managing policies, standards and procedures from any department within your organization.
TRIAL SOFTWARE:
NetIQ Security Solutions for iSeries offer proven protection to hundreds of customers on thousands of servers, providing simplified auditing, vulnerability management and security administration for your iSeries and AS/400 systems.
DATA SHEET:
For organizations that need to ensure the security of critical or sensitive systems, CORE IMPACT is a must-have tool. This Information Security Review examines CORE IMPACT and highly recommends it as an effective security device.
TRIAL SOFTWARE:
NetIQ's Directory and Resource Administrator provides advanced delegation and robust, policy-based administration capabilities that improve the security and efficiency of your Microsoft Windows environment.
CASE STUDY:
The LA Times faced challenges securing its internal network and complying with PCI to address both issues they decided to implement an IPS they develop selection criteria, investigated several solutions, and ultimately selected Sourcefire.
EZINE:
This month's cover story is about reigning in privileged accounts such as the UNIX root and Windows Administrator accounts. Regulatory requirements and economic realities are pressuring enterprises to secure their privileged accounts, but how? Also in this issue: Keeping UTM Unified instead of Unnecessary, and more. Read on to learn more.
WHITE PAPER:
This white paper helps you understand the variety of security assessment options that are available and provides the criteria for selecting a vendor that can help you meet your company?s security requirements.
TRIAL SOFTWARE:
The NetIQ AppManager Suite product (AppManager Suite) enables IT organizations to meet their service level commitments while maximizing staff efficiency, with deep real-time diagnostics.
WHITE PAPER:
This paper explains the two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis.