New & Notable
Threat management and prevention News
November 07, 2014
This week, OpenDNS unveiled a new management feature in its Umbrella for MSPs console; Metalogix launched the Cloud Acceleration Suite and partner program; and more.
August 22, 2014
In this channel news roundup, ThreatTrack's VP of global channels discusses the vendor's partnership with Global Convergence; Ingram Micro prepares for federal buying season; and more.
June 27, 2014
Vendor Trend Micro announced it's globalizing its regional partner program, offering its worldwide partner base a standardized set of program features, benefits and requirements.
April 30, 2014
While the Heartbleed security bug prompts viability questions about OpenSSL, enterprises should be working with vendors to implement patches.
Threat management and prevention Get Started
Bring yourself up to speed with our introductory content
A peer-to-peer botnet is a decentralized group of malware-compromised machines working together for an attacker’s purpose without their owners’ knowledge. Just as in the traditional botnet, which includes a command-and-control server, the bots are ... Continue Reading
A botnet topology is the network structure by which botnet interconnections are organized. Botnet topologies may be either centralized around a command and control server (C&C server) or decentralized using peer-to-peer (P2P) communication. Continue Reading
Josh Sokol reviews the security technologies needed to support a successful security analytics program focused on advanced malware detection. Continue Reading
Evaluate Threat management and prevention Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
It's critical for SMB customers to understand that they are potential targets of cybercrime, according to Page Moon, CIO of Focus Data Solutions. Continue Reading
Secure software development expert Gary McGraw said the main lesson of Heartbleed is to control open source risk. Continue Reading
Cisco's Service Program Partners can now tap Managed Threat Defense managed security services for their customers. Continue Reading
Product ReviewsPowered by IT Central Station
The FortiGate security appliances. UTM security in a single device, good administrative interface and performances.Powered by IT Central Station
First things first Talking about FortiGate from Fortinet we are talking about a family of UTM (Unified Threat Management) appliances. This...Continue Reading
For price criteria, Fortinet wins over competitors. That being said, certain areas of the product need improvementPowered by IT Central Station
Valuable Features: <ul> <li>Performances</li> <li>VDOM</li> <li>UTM</li> <li>Consolidated...Continue Reading
Powered by IT Central Station
Cisco ASA has better application granularity, a more flexible means of policy creation, and easier to use controls and more powerful reports ...Continue Reading
Manage Threat management and prevention
Learn to apply best practices and optimize your operations.
For those managed service providers with enough agility, Heartbleed provided an opportunity for IT solution providers to earn customers' loyalty. Continue Reading
Are critics of the penetration test wrong? Find out what breaking and entering your enterprise network can reveal about the state of your security. Continue Reading
In this FAQ, learn how the Heartbleed vulnerability was discovered, the potential damage inflicted by the bug and advice to avoid security risks. Continue Reading
Problem Solve Threat management and prevention Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Learn the seven bad habits that leave you vulnerable to Web-borne malware attacks, and the changes you can make to secure your online life in 2014. Continue Reading
More granular data is needed from an enterprise IPS than ever before. Brad Casey explores why and reveals other ways to get the info sought. Continue Reading
Malware leveraging PKI and digital signatures is increasingly common. Nick Lewis explains the threat and five key defense strategies. Continue Reading