MIMEsweeper was one of the first products capable of protecting organizations against unwanted content, and it is still widely used today. The vendor, Clearswift, acquired MIMEsweeper's developer, Content Technologies, from Baltimore last year, and it is good to see that re-branding and product development have happened so quickly.
Today, MIMEsweeper is not just one product, but a suite of email security applications allowing network administrators to fine-tune their defenses as required. With the MAILsweeper application, administrators can define both the routing of all emails into and out of the network, and the content policies required. Throughout, the performance of the various elements can be monitored and the appropriate action taken.
Another approach to email security is to actively manage the emails being sent and received by your organization by means of rules and policies. This methodology is possibly more suited to those companies that require detailed audit trails, or who have had a problem with the unauthorized release of proprietary information via email, and it is the methodology espoused by Futuresoft's DynaComm i:series of products.
The control of email is the responsibility of DynaComm i:mail, which is fully integrated with the other products in the suite - these include an internet traffic filter and a file content scanner. Built into a dedicated SMTP server, the product can be positioned in a number of locations, depending on the configuration of your network and the needs of your business. It can also be located within the internal network, in which case all email - inbound and outgoing - will be processed. For smaller businesses with low email use - and smaller budgets - it can be located with the email server itself.
One potential security loophole that is frequently overlooked is access to removable media. Many access control products will bar your way into the file server, log your attempts to look at the payroll database, and prevent you from using certain applications, but this is all at the system level.
If you think Unix houses have been ignored in this test, Symark's PowerBroker is just for you. Supporting multiple flavors of Linux and Unix - including IBM S390 Linux - PowerBroker ensures Unix administrative privileges can be safely managed and delegated.
This solution is probably more suited to the smaller business model as it requires separate installation at every workstation, unless you utilize the separate deployment console BitDefender Enterprise. This allows the installation, scanning, uninstall or the change of settings on all machines in the network. It can also be deployed across the larger network using wireless application protocol (WAP).
Most vendors deliver a variety of packages for different needs, but F-Secure puts one solution into a host of business models. Whether you are looking for a single user license, SME or enterprise, F-Secure AntiVirus version 5 delivers the whole shooting match.
Not all users want to resort to single user products to protect their SME business systems, and often the corporate editions are just not geared to the smaller business model. But McAfee Active Virus Defense Small Business Edition offers the level of security required for the SME market without compromising on any vital areas of virus protection. It delivers a suite of products that enables the SMEs amongst us to manage, update, and police our systems before any damage is done.
NOD32 can be initiated for server or workstation use, making it very flexible for the SME market. The range of features is also good. Automatic updates are provided, and it also offers updates via CD or floppy disk for non-networked machines. Central configuration can be rolled out to workstations and a silent alert can be achieved for admin use.
OfficeScan gives the administrator some real choices when it comes to network deployment, from centralized roll out to imaging, remote installation and an uninstall of other anti-virus products to facilitate an OfficeScan install. These are not options that many of the other solutions are offering, and for the larger SME or it may prove a real boon.
Access control comes in many flavors, depending on what you want or don't want users to have access to. Now it's the turn of other documents to get some added protection with Adhaero's business document security solution. This protection extends beyond the network, and documents under its aegis can only be read by authorized eyes. It allows Word, Excel, PowerPoint and Outlook objects to be encrypted, and then assigns digital rights that dictate what can be done to them.
We are back in the world of passwords for Computer Associates' offering. Part of the eTrust suite of products, eTrust AccessControl is another policy-based application, fully integrated with the other eTrust products, as well as with CA's UniCenter network management software. It is designed to operate in Windows, Unix and Linux, and interoperates with (surprising, but not unwelcome), mainframe environments.
Novell is no stranger to access management; such functionality was built into its NetWare operating system from day one, and is an integral part of its Directory Services offering. So, it comes as no surprise to see a standalone Novell product in this Group Test.
One potential security loophole that is frequently overlooked is access to removable media. Many access control products will bar your way into the file server, log your attempts to look at the payroll database, and prevent you from using certain applications, but this is all at the system level.
If you think Unix houses have been ignored in this test, Symark's PowerBroker is just for you. Supporting multiple flavors of Linux and Unix - including IBM S390 Linux - PowerBroker ensures Unix administrative privileges can be safely managed and delegated.
This solution is probably more suited to the smaller business model as it requires separate installation at every workstation, unless you utilize the separate deployment console BitDefender Enterprise. This allows the installation, scanning, uninstall or the change of settings on all machines in the network. It can also be deployed across the larger network using wireless application protocol (WAP).
Most vendors deliver a variety of packages for different needs, but F-Secure puts one solution into a host of business models. Whether you are looking for a single user license, SME or enterprise, F-Secure AntiVirus version 5 delivers the whole shooting match.