Security managers need cutting-edge technologies to get a 30,000-foot view of their operation—and to wage the ongoing battle against network attacks. Seven executives share their war stories. Plus, key product vendors are listed.
Story guide:
3 Key Security Tools: Introduction
Security managers need cutting-edge technologies to get a 30,000-foot view of their operations—and to wage the ongoing battle against network attacks. They include:
This software can help you paint a picture of your enterprise’s overall security health and exposure. Plus, five key vendors and their customers.
Want to enforce corporate policies on desktop computers about what behavior is and isn’t allowed? Start here. Plus, six key vendors and their customers.
These systems can help you proactively block network traffic without requiring manual intervention. Plus, six key vendors and their customers.