Vulnerability Assessment & Remediation
Designed to cope with voluminous security updates and intermittently connected mobile devices, Hercules 3.5 assists enterprise IT managers in doing something useful with the floods of vulnerability data that flow from the assessment tools already in placeWINNER Citadel Security Software Inc.
Hercules 3.5 Designed to cope with voluminous security updates and intermittently connected mobile devices, Hercules 3.5 assists enterprise IT managers in doing something useful with the floods of vulnerability data that flow from the assessment tools already in place at many sites.
Integrity 5.0 Formerly the flagship product of Zone Labs Inc., Integrity now bears the brand of Check Point Software Technologies following the latters acquisition of Zone Labs at the end of 2003. Building on the partner relationship that already existed between the companies, Integrity added centrally managed endpoint protection to Check Points firewall technology portfolio. Integritys automated policy enforcement combines with streamlined setup of VPN connections to minimize the risk that a VPN client will become a privileged point of entry for attacks on network assets. Go to www.checkpoint.com/products/integrity for more information. McAfee Inc.
McAfee Foundstone Enterprise 4.0 Vulnerability assessment technology has arguably become its own worst enemy: The sheer amount of data that tools and services produce can overwhelm IT staff almost as effectively as the attacks that theyre trying to prevent. Correlating details and clarifying patterns while drawing on a global perspective and analyzing effectiveness over timethese are the practices that make security cost-effective rather than merely a frustrating exercise in due diligence. These strengths highlight the Foundstone Enterprise offering from McAfee, which won recognition from the Excellence judges for its comprehensive scope. More information is at www.foundstone.com/products/enterprise.htm. Excellence Awards Winners and Finalists: