3 Key Computer Security Tools You Should Be Using

Security managers need cutting-edge technologies to get a 30,000-foot view of their operation—and to wage the ongoing battle against network attacks. Seven executives share their war stories. Plus, key product vendors are listed.

Story guide:

3 Key Security Tools: Introduction

Security managers need cutting-edge technologies to get a 30,000-foot view of their operations—and to wage the ongoing battle against network attacks. They include:

  • Tool 1. Security Information Management
    This software can help you paint a picture of your enterprise’s overall security health and exposure. Plus, five key vendors and their customers.

  • Tool 2. End-Point Security

    Want to enforce corporate policies on desktop computers about what behavior is and isn’t allowed? Start here. Plus, six key vendors and their customers.

  • Tool 3. Intrusion Prevention Systems
    These systems can help you proactively block network traffic without requiring manual intervention. Plus, six key vendors and their customers.

  • CIO Insight Staff
    CIO Insight Staff
    CIO Insight offers thought leadership and best practices in the IT security and management industry while providing expert recommendations on software solutions for IT leaders. It is the trusted resource for security professionals who need network monitoring technology and solutions to maintain regulatory compliance for their teams and organizations.

    Get the Free Newsletter!

    Subscribe to Daily Tech Insider for top news, trends, and analysis.

    Latest Articles