PODCAST:
Join IT expert David Arbeitel and listen to the Podcast, "5 Steps to a Successful Vista Migration: How Network Assurance Minimizes Business Risk" and discover how to make the most of your Vista migration.
WHITE PAPER:
This informative whitepaper explores the history of DLL side-loading and its role in the malware arena – affecting your enterprise security.
TRIAL SOFTWARE:
PrimalScript Professional 4.0 now with a host of advanced features targeted at reducing script development time and effort and introducing PrimalScope, PrimalScript's truly built-in debugger for Windows scripting.
WHITE PAPER:
With exploits for known vulnerabilities unleashed on the Internet within as little as 5 days from the release of new patches from Microsoft, it is imperative your desktops and servers be regularly updated to keep them safe from attack.
TRIAL SOFTWARE:
Forefront Security for Exchange helps protect your email infrastructure from infection and downtime through an approach that emphasizes layered defenses, optimization of Exchange Server performance and availability, and simplified management control.
TRIAL SOFTWARE:
GFI LANguard S.E.L.M. ships with a security event analysis engine which takes into account the type of security event, security level of each computer, when event occurred, role of computer and its operation system.
EGUIDE:
Targeted attacks are growing, and eventually your enterprise will be a target. In this e-guide, expert Richard Bejtlich covers how to collect Windows Event logs to detect an intrusion.
TRIAL SOFTWARE:
ISA Server 2006 from Microsoft helps protect your IT environment from Internet-based threats while providing your users with fast and secure remote access to applications and data.
PODCAST:
This Podcast explores the key features and benefits of Mail Security 5.0 including a new user interface, an enhanced content filtering rules, new user group based rules, and windows cluster support.
EGUIDE:
There are a lot of moving parts, and there's no simple fix for Windows security. That said, there are things you can do to reduce desktop vulnerabilities. This e-guide helps you understand the common flaws exploited in Windows security scans and provides 4 ways to take vulnerability management to the next level.