Order of the day Integrated Security

Jain, Sanjeev
February 2005
Siliconindia;Feb2005, Vol. 9 Issue 1, p34
The article discusses antivirus company McAfee Security's integrated solution for computer security. It delivers comprehensive protection from malicious threats under one management console, providing customers with a greater degree of control for detecting known and unknown threats. Organizations can now streamline security and eliminate the need for point solutions by deploying proactive McAfee system protection across all end nodes. This will reduce the number of security solutions that need to be managed, eliminate stability issues and management costs associated with multiple layers of security software on PCs and servers, and enable a tightly controlled environment for patching of vulnerabilities and malicious threats.


Related Articles

  • Today's Attackers Can Find the Needle. Mimoso, Michael S.; Savage, Marcia // Information Security;Jun2006, Vol. 9 Issue 6, p24 

    This article discusses the type of for-profit crime plaguing the Internet. Today's hackers want customer data and intellectual property and they also want to infiltrate government agencies. Stealth technology that are being used by attackers include rootkits which are bundled in spyware. Ways to...

  • An Usage-Centric Botnet Taxonomy. Czosseck, Christian; Podins, Karlis // Proceedings of the European Conference on Information Warfare & ;2011, p65 

    Botnets have been a recognized threat to computer security for several years. On the timeline of malware development, they can be seen as the latest evolutionary step. Criminals have taken advantage of this new technol-ogy and cyber crime has grown to become a serious and sophisticated problem...

  • Hacker tracer.  // CRN;11/7/2005, Issue 1170, p38 

    This article focuses on various computer hackers. A buffer overflow vulnerability in Oracle l0g can allow an attacker to execute commands remotely with administrative privileges. Multiple security flaws in BCA Systems' WebLogic Server may allow an attacker to execute denial-of- service attacks,...

  • EXPOSED! Top Hacker Secrets…. Macleod, Calum // Management Services;Summer2007, Vol. 51 Issue 2, p46 

    The article offers information on computer hacking. According to the author, it often starts when a hacker sees a file directory or workstation that is just too hard to pass by, like one named salary comparison. Once hackers decide to break into a target system, their next stop is a search...

  • Ending the age of the password.  // Computer Weekly;2/22/2005, p30 

    The article discusses the idea of ending the age of the password. IT directors face the constant challenge of giving the business enough flexibility to access IT however, wherever and whenever end-users need to, while keeping out intruders. Meanwhile, hackers are using ever more devious means of...

  • VIRUSES. Brooks, Greg // New Media Age;1/11/2007, Special section p4 

    This article explains how to counter viruses in computer networks of companies. The change in the nature of viruses has run alongside the rise in the use of the Internet for business purposes. Alfred Biehler, security and management product manager at Microsoft, advised to get sort building and...

  • ID Theft: Keep Your Information to Yourself. Perry, Phillip // Rural Telecommunications;Mar/Apr2004, Vol. 23 Issue 2, p62 

    Presents tips to protect information on computers from identity theft. Ways to block the attack of computer hackers; Advice to reduce overall computer security risks; Information on computer virus and trojan horse software.

  • New research predicts digital Armageddon.  // MarketWatch: Technology;February 2005, Vol. 4 Issue 2, p23 

    Reports on a survey aimed to collect predictions on how the Internet will affect society in the next decade in the U.S. Indications showing a wide agreement among expert respondents that at least one devastating attack will occur on the networked information infrastructure; Contentions over the...

  • Why timing is crucial in the botnet wars. Biever, Celeste // New Scientist;3/4/2006, Vol. 189 Issue 2541, p32 

    The article focuses on dealing with computer worms. Unlike their biological counterparts, computer worms don't come out at night. Taking this into account could help computer security firms calculate when outbreaks are likely to pose the greatest risk, allowing them to set the installation of...

  • Instant messaging reveals security holes. Chien, Eric // Business Journal (Central New York);10/22/2004, Vol. 18 Issue 43, p16 

    The article focuses on security issues related to instant messaging service. Most users of this service are unaware of the insecurities that exist within this communications tool. Worms and vulnerabilities that can give hackers remote access to susceptible computers ultimately threaten the...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics