|
|
| |
| Main » 2010 » January » 08
Secure USB Storage – Avoid a Moving Liability! Today's mobile workforce often carries sensitive corporate data on portable USB drives, unaware of the security risk if the drives are lost or stolen. McAfee Encrypted USB devices keep sensitive data safe and secure, wherever it goes. A variety of Encrypted Device options are available- hard disks range in storage size from 80 GB to 320 GB, while sticks range from 1 GB to 32 GB. Features: * Centralized management with McAfee ePolicy Orchestrator® (ePO™) Extend company-wide security policies to USB drives, ensuring data stored on these devices is protected if they are lost or stolen. Initialize any McAfee Encrypted USB device simply by plugging the device into any McAfee ePO-managed machine with its unique “no-touch” initialization capabilities. * Standard driverless secure USB storage Protect sensitive informati
...
Read more »
|
Identify risk exposures and policy violations. Prioritize resources. Reduce risk. Which threats and vulnerabilities require your attention? Which policies have been violated? Quickly and accurately find and prioritize vulnerabilities and violations on your networked systems with McAfee Vulnerability Manager (formerly McAfee Foundstone® Enterprise). Meet PCI DSS quarterly scan requirements with McAfee PCI Certification Services. McAfee is a PCI Approved Scanning Vendor (ASV). Network vulnerabilities and threats pose serious risks to all businesses. Compound that with compliance and policy requirements plus the rigorous demands of audits, and you're bound to lose sleep at night. Put risk and compliance concerns to bed with McAfee Vulnerability Manager. Its priority-based approach combines vulnerability, asset data, and countermeasures to help you make more informed decision
...
Read more »
|
Business today is more Internet-dependent than ever before. From mission-critical services to productivity tools, Internet access to information, resources and communications is indispensable. But this critical infrastructure can also deliver productivity drains, liability risks, bandwidth waste, and malware infection Safe surfng from within the business requires enterprise-class solutions for both security and traffc reporting. Organizations need scalable comprehensive reporting to understand their web use and to help ensure compliance McAfee Web Reporter gives organizations the tools they need to understand today s web traffc quickly and easily. Available for both McAfee SmartFilter and McAfee Web Gateway (formerly Webwasher), Web Reporter lets organizations identify trends, investigate potential problems and analyze security threats as a basis for refning and enforcing policies for secure
...
Read more »
|
The COMODO Internet Security was designed to be the that integrates COMODO Antivirus, COMODO Firewall and COMODO Defense+ in a seamless manner. We have also fixed many bugs in COMODO Firewall with this release. COMODO Firewall or COMODO Antivirus canbe installed as standalone products by using the same setup. Internet Security combines the power of COMODO's award-winning Firewall and AntiVirus software to protect your PC from malicious software and Hackers. Best of all is FREE! Comodo Internet Security will help you detect and remove viruses, Trojans, and other malicious software and hackers, and keep them out of your computer. In one easy-to-use bundle that won't slow down your computer. All free, really! No Credit Card Required for this download. • Award-winning Firewall Protection • AntiVirus Software • Proactive Security Developed by one of the world's
...
Read more »
|
Elcomsoft Wireless Security Auditor allows network administrators to verify how secure a company’s wireless network is by executing an audit of accessible wireless networks. Featuring patent-pending cost-efficient GPU acceleration technologies, Elcomsoft Wireless Security Auditor attempts to recover the original WPA/WPA2-PSK text passwords in order to test how secure your wireless environment is. It examines the security of your wireless network by attempting to break into the network from outside or inside. Elcomsoft Wireless Security Auditor works completely in off-line, undetectable by the Wi-Fi network being probed, by analyzing a dump of network communications in order to attempt to retrieve the original WPA/WPA2-PSK passwords in plain text. Elcomsoft Wireless Security Auditor allows carrying out a password audit within a limited timeframe. Representing state-of-the-art in p
...
Read more »
| |
|
|
|
| |
|
Statistics |
|
Total online: 5 Guests: 5 Users: 0 | |
|
|