Home
 > search for

Featured Documents related to »  mcafee security


Security for Small and Medium Businesses
We all know what security means when we think of our home. Did we lock the door when we left for the day? Is the stove turned off? Computer security for the

mcafee security  ( http://www.symantec.com ) and McAfee ( http://mcafee.com ). Both offer excellent products and services that address a business’s network, the server, and the desktop. Usually the purpose of a virus attack to a business system is to obtain confidential data, such as customer and credit card information. Recently, two businesses of note were hacked into even though due diligence was practiced: TJMax and Hannaford Brothers, each having 4 million credit cardholders. What must an SMB do to protect itself Read More...
Information Security Selection
Start evaluating software now
Country:

 Security code
Already have a TEC account? Sign in here.
 
Don't have a TEC account? Register here.

Documents related to » mcafee security


Antivirus Software: Market Review
Computer viruses are spreading through the Internet at an unprecedented rate and the antivirus market is now a $3 billion (USD) a year industry. This report

mcafee security  eTrust EZ Antivirus outperformed McAfee and Trend, our tests were all performed in a lab environment. For most people, it is more important to know how the products will perform in the real world. Since there is no way for us to quantify each product's performance during day to day use, the best way to judge real world performance is to combine our test results with the functionality of each company. Table 6: Results with a Higher Priority Assigned to Supplemental Security Features Feature and Possible Read More...
Information Security Firewalls Market Report Part One: Market Overview and Technology Background
The firewall market is a mature and competitive segment of the information security market. With numerous vendors and firewalls in all price ranges choose from,

mcafee security  However, Symantec has eclipsed McAfee in sales, and now has over 5,000 employees that span the globe. Founded in 1982, Symantec is one of the biggest and most respected names in the world of Internet security products today and offers multiple Internet security product lines. John Thompson is Symantec's CEO. Figure 4. Symantec's Stock Performance Over the Last Year Product Overview Cisco and Juniper primarily focus on selling appliance firewalls while Check Point only sells software firewalls. Symantec Read More...
Vulnerability Assessment and Prevention with Rapid7
Ever hear of a company or government agency’s computer systems falling victim to some individuals' malicious activities? In spite of the frequent news

mcafee security  Vendors such as Rapid7, McAfee, or Qualys offer different types of software to assess, manage, or curtail your information technology (IT) systems’ vulnerabilities. I recently saw a demonstration of Rapid7’s products and would like to highlight a bit of what they can be used to do toward efforts at hardening IT systems. A general refrain from Rapid7 ( Web site ) is that organizations often put a low priority on preventative security because of budget restrictions, the fear of additional workload on Read More...
Network Associates Hopes to Rekindle the Flame
Though the security market has been exploding, Network Associates, Inc. (NAI) will likely post a loss for FY'99. However, don't expect the security monolith to

mcafee security  Network General merged with McAfee Associates. The merger brought on the new name, and further acquisitions continued to add to its suite of information security point products. Upon acquiring Trusted Information Systems (TIS) in April 1998, NAI added the well-known Gauntlet firewall to its product line. Boasting a throughput of 11.5mbs, and over 30,000 simultaneous connections, Gauntlet was at one time among the most highly respected and technologically sound firewalls. In recent years however, Gauntlet Read More...
Vendor Analysis: Interliant's Security Vulnerability Assessment
A security vulnerability assessment service is a risk management process. Interliant's security vulnerability assessment service enables its clients to

mcafee security  Analysis: Interliant's Security Vulnerability Assessment Vendor Analysis: Interliant's Security Vulnerability Assessment Featured Author -  Laura Taylor - January 14, 2002 Introduction A security vulnerability assessment service is a risk management process. Interliant's security vulnerability assessment service enables its clients to understand what risks their online transaction systems and network infrastructure face. Relevant Technologies has taken an in-depth look at Interliant's security Read More...
End-to-end Encryption Security Requirements
The Secure POS Vendors Alliance (SPVA) commissioned the End-to-end Security workgroup to provide clear guidelines on the application of encryption technology to

mcafee security  to-end Encryption Security Requirements The Secure POS Vendors Alliance (SPVA) commissioned the End-to-end Security workgroup to provide clear guidelines on the application of encryption technology to payment card data used for retail financial transactions. This document addresses encrypting payment card data in tamper-resistant security modules. Read More...
Effective Operational Security Metrics
Due to the changing regulatory environment and the complexity of business today, organizations are facing increased accountability. Security risks, however, can

mcafee security  Operational Security Metrics Due to the changing regulatory environment and the complexity of business today, organizations are facing increased accountability. Security risks, however, can often be difficult to measure and even more difficult to understand by people outside of the department. The key to demonstrating improvement is to translate security information in to business terms. Organizations must align, manage, and measure security around business operations. Read More...
Security and Trust: Doing More Business Over the internet
Learn how a secure web site can help you make sales in Security and Trust: Doing Business Over the Internet.

mcafee security  and Trust: Doing More Business Over the internet If consumers don—t trust your web site, you—ll pay for it with lost sales and abandoned shopping carts. Learn how a secure web site can help you make sales in Security and Trust: Doing Business Over the Internet . You—ll learn about the different types of technologies that provide security for sensitive data—identifying your site as trustworthy in the eyes of customers—and how making your web site safe and secure can significantly increase Read More...
Standard & Poor's Announces Security Certification
After exposing numerous customers to embarrassing security vulnerabilities, S&P announces a security certification program.

mcafee security  & Poor's Announces Security Certification Standard & Poor's Announces Security Certification L. Taylor - July 31, 2000 Event Summary Earlier this year, some private industry security experts, in conjunction with SecurityFocus.com, identified and exposed the security vulnerabilities on Standard & Poor's Comstock boxes. TEC published the story of this security faux pas earlier this month. After the story was published, Standard & Poor's announced a certification program dubbed Security Circle Read More...
Understanding the PCI Data Security Standard
The payment card industry data security standard (PCI DSS) defines a comprehensive set of requirements to enhance and enforce payment account data security in a

mcafee security  the PCI Data Security Standard MessageLabs Hosted Web Security and Content Filtering service operates at the Internet level, intercepting viruses, and spyware. Source : MessageLabs | Now part of Symantec Resources Related to Understanding the PCI Data Security Standard : Payment Card Industry Data Security Standard (PCI DSS) (Wikipedia) Understanding the PCI Data Security Standard Data Security is also known as : Data Security Architecture , Data Security Articles , Data Security Audit , Read More...
Intrusion Detection and Security Auditing In Oracle
Database intrusion detection and security auditing continues to grow in importance. Thus, monitoring your database applications is a critical component of

mcafee security  Detection and Security Auditing In Oracle Database intrusion detection and security auditing continues to grow in importance. Thus, monitoring your database applications is a critical component of achieving a strong defense-in-depth around your sensitive data. However, to be efficient and effective, you must use the right combination of tools. Monitoring should never replace other layers in the security stack—it should complement the existing pieces instead. Read More...
Developing a Collaborative Endpoint Security Solution: Why Perimeter Security Is Not Enough
Information security is more than just a technology. Two other areas also require consideration: processes and people. Each element is a critical point of the

mcafee security  a Collaborative Endpoint Security Solution: Why Perimeter Security Is Not Enough Information security is more than just a technology. Two other areas also require consideration: processes and people. Each element is a critical point of the information security triangle, and a change in one area affects the other two. Download this white paper to learn how a collaborative approach to endpoint security can help ensure that your security solution is both comprehensive and effective. Read More...
Study Shows: FBI Alienates Industry Security Experts
A comprehensive study done by TechnologyEvaluation.Com has shown that, for years the FBI has been alienating industry security experts. Some of the best

mcafee security  Shows: FBI Alienates Industry Security Experts Study Study Shows: FBI Alienates Industry Security Experts L. Taylor - August 21, 2000 Problem Fighting cybercrime is complex and time-consuming. One case can involve a multitude of computer systems, networks, and administrators, and requires the cooperation of all system owners, and sometimes many nations, in order to find the perpetrator. Due to their love of technology, their education, training, and experience, it is not uncommon for security Read More...
Saudi Arabian Network Security Provokes Local Considerations
Internet security in Saudi Arabia does not go overlooked. Are the Saudis being over zealous and paranoid, or are they practicing smart network security?

mcafee security  Arabian Network Security Provokes Local Considerations Event Summary In The Kingdom of Saudi Arabia, the entire Internet backbone is concealed behind a countrywide firewall that is built on Sun Solaris servers using the freeware proxy server known as Squid. The firewall is located at the King Abdul Aziz University for Science and Technology (KACST). To keep foreign nations from viewing various local Saudi websites, the massive firewall blocks TCP/IP ports 80 and 443 for all connections coming into Read More...

Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others