Home
 > search for

Featured Documents related to »  mcafee security


Security for Small and Medium Businesses
We all know what security means when we think of our home. Did we lock the door when we left for the day? Is the stove turned off? Computer security for the

mcafee security  ( http://www.symantec.com ) and McAfee ( http://mcafee.com ). Both offer excellent products and services that address a business’s network, the server, and the desktop. Usually the purpose of a virus attack to a business system is to obtain confidential data, such as customer and credit card information. Recently, two businesses of note were hacked into even though due diligence was practiced: TJMax and Hannaford Brothers, each having 4 million credit cardholders. What must an SMB do to protect itself Read More

Information Security Selection
Start evaluating software now
Country:
 Security code
Already have a TEC account? Sign in here.
 
Don't have a TEC account? Register here.

Documents related to » mcafee security


Network Associates Hopes to Rekindle the Flame
Though the security market has been exploding, Network Associates, Inc. (NAI) will likely post a loss for FY'99. However, don't expect the security monolith to

mcafee security  Network General merged with McAfee Associates. The merger brought on the new name, and further acquisitions continued to add to its suite of information security point products. Upon acquiring Trusted Information Systems (TIS) in April 1998, NAI added the well-known Gauntlet firewall to its product line. Boasting a throughput of 11.5mbs, and over 30,000 simultaneous connections, Gauntlet was at one time among the most highly respected and technologically sound firewalls. In recent years however, Gauntlet Read More
Network Associates RePositions Itself as a Security E-Village
With a new organizational strategy, Network Associates hopes to retain and recruit savvy security engineers and leverage the hot IT security market for outside

mcafee security  Technologies, Magic Solutions, and McAfee Corporation which spun off with its own IPO last December. Each of the four divisions stand to hire their own CEO or president to lead the strategic developments of their respective organizations. On top of the new business model, Network Associates is opening a new front door to its four lines of business called MyCIO.com. Market Impact It is clear that Network Associates hopes to benefit from the increased attention the IT market, the government, and CIO's, are Read More
Information Security Firewalls Market Report Part One: Market Overview and Technology Background
The firewall market is a mature and competitive segment of the information security market. With numerous vendors and firewalls in all price ranges choose from,

mcafee security  However, Symantec has eclipsed McAfee in sales, and now has over 5,000 employees that span the globe. Founded in 1982, Symantec is one of the biggest and most respected names in the world of Internet security products today and offers multiple Internet security product lines. John Thompson is Symantec's CEO. Figure 4. Symantec's Stock Performance Over the Last Year Product Overview Cisco and Juniper primarily focus on selling appliance firewalls while Check Point only sells software firewalls. Symantec Read More
Antivirus Software: Market Review
Computer viruses are spreading through the Internet at an unprecedented rate and the antivirus market is now a $3 billion (USD) a year industry. This report

mcafee security  eTrust EZ Antivirus outperformed McAfee and Trend, our tests were all performed in a lab environment. For most people, it is more important to know how the products will perform in the real world. Since there is no way for us to quantify each product's performance during day to day use, the best way to judge real world performance is to combine our test results with the functionality of each company. Table 6: Results with a Higher Priority Assigned to Supplemental Security Features Feature and Possible Read More
Top 5 Mobile Security Threats
While mobile malware still accounts for a mere fraction of the millions of threats targeting personal computers, the past year has seen the explosive growth of

mcafee security  5 Mobile Security Threats While mobile malware still accounts for a mere fraction of the millions of threats targeting personal computers, the past year has seen the explosive growth of malicious code. What’s worse is that 50 percent of employees currently use their mobile devices at work. Early recognition of mobile security threats is a company’s best line of defense. Here are today’s top 5 mobile security threats and how to stop them in their tracks. Read More
Best Practices for Deploying LAN Security and NAC
Good security used to mean perimeter firewalls and desktop anti-virus software. However, threats don’t come just from outside the company any more. That means

mcafee security  Practices for Deploying LAN Security and NAC Good security used to mean perimeter firewalls and desktop anti-virus software. However, threats don’t come just from outside the company any more. That means security must go beyond the desktop and into the network infrastructure itself. You can stop security breaches at the source—with multimethod and microsecond threat detection—before any damage is done to your network and your business. Read More
Information Security Selection Software Evaluation Report
Based on a wide range of security-related issues, the Information Security Knowledge Base covers both solution suites and individual software packages

mcafee security  Security Selection Software Evaluation Report TEC's Information Security Selection Software Evaluation Report allows you to compare and analyze the features, functions, and services of multiple enterprise software solutions. Vendor responses are comprehensively rated on their level of support of for each criterion (supported, not supported, customization, future releases, etc.) to ensure you make and accurate and informed decision. This Software Evaluation Report provides extensive information a Read More
End-to-end Encryption Security Requirements
The Secure POS Vendors Alliance (SPVA) commissioned the End-to-end Security workgroup to provide clear guidelines on the application of encryption technology to

mcafee security  to-end Encryption Security Requirements The Secure POS Vendors Alliance (SPVA) commissioned the End-to-end Security workgroup to provide clear guidelines on the application of encryption technology to payment card data used for retail financial transactions. This document addresses encrypting payment card data in tamper-resistant security modules. Read More
Case Study: Security Benefit
Security Benefit is a financial services company based in Topeka, Kansas (US). The company’s outside sales team operates from remote locations nationwide. For

mcafee security  Study: Security Benefit Security Benefit is a financial services company based in Topeka, Kansas (US). The company’s outside sales team operates from remote locations nationwide. For years, the company used an internally developed contact management system to support its remote sales force. But, field sales staff couldn’t stay connected to the most relevant business data. Learn about the solution that gave the company access to real-time data. Read More
Application Security, Inc.
Application Security, Inc. (AppSecInc) is the leading provider of application security solutions for the enterprise. AppSecInc's products – the industry's

mcafee security  Security, Inc. Application Security, Inc. (AppSecInc) is the leading provider of application security solutions for the enterprise. AppSecInc's products – the industry's only complete vulnerability management solution for the application tier – proactively secure enterprise applications at more than 350 organizations around the world. Historically, organizations have secured their networks and host operating systems by applying the vulnerability management methodology. This four-step Read More
IBM Announces IBM Security Intelligence with Big Data
IBM has announced IBM Security Intelligence with Big Data, an offering that combine big data analytics with security intelligence capabilities for addressing

mcafee security  Announces IBM Security Intelligence with Big Data IBM has announced IBM Security Intelligence with Big Data , an offering that combine big data analytics with security intelligence capabilities for addressing both internal and external cyber security threats. The solution aims to provide a comprehensive offering for security analysts to extend their capabilities in detection and prevention. Made in IBM Labs, Security Intelligence with Big Data enables big data analysis with real-time correlation Read More
IT Security


mcafee security  Security Read More
Emerging Security Threats Demand Comprehensive Infrastructure Monitoring
A multibillion-dollar crime industry is changing the security landscape. Cyber-theft of intellectual property, customer data, and money is on the rise—directly

mcafee security  Security Threats Demand Comprehensive Infrastructure Monitoring A multibillion-dollar crime industry is changing the security landscape. Cyber-theft of intellectual property, customer data, and money is on the rise—directly impact¬ing corporation’s bottom lines. To stay ahead of these targeted attacks, you need a comprehensive view of point secu¬rity solutions and infrastructure monitoring tools—without the cost-prohibitive labor hours involved in manual log analysis or proprietary Read More
Popular Searches

Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others