Security

Let's face it. Software has holes. And hackers love to exploit them. New vulnerabilities appear almost daily. If you have software - we all do - you need to keep tabs on the latest vulnerabilities.

Featured Stories

Articles about Security

Acronis vmProtect 6

Acronis vmProtect 6

An ideal backup tool for small businesses and larger enterprises alike, vmProtect 6 makes light work of protecting and rapidly recovering virtual machines on VMware vSphere hosts.

January 23, 2012 by in Security

SonicWALL TZ 210

SonicWALL TZ 210

SonicWALL's feature-packed TZ 210 gateway security appliance is capable of protecting all kinds of networks at a very affordable price. It's easy to setup and manage, and sets a new price point in the UTM market.

October 15, 2009 by in Security

PC Tools Desktop Maestro 3.0

PC Tools Desktop Maestro 3.0

As a tool for cleaning an untidy Windows registry, PC Tools Desktop Maestro seems to do a good job, and combines this ability with excellent privacy tools. However, users of Windows Vista may find Desktop Maestro being blocked by User Account Control.

August 21, 2008 by in Security

Symantec Backup Exec 12

Symantec Backup Exec 12

Symantec Backup Exec 12 allows complete system recovery and concentrates on continuous file/data protection. Though AU$1,795 may seem a lot of money for an application, Backup Exec might be worth the investment if you're using it for irreplaceable and highly valuable data.

July 13, 2008 by in Security

Ad-Aware 2007

Ad-Aware 2007

Lavasoft Ad-Aware 2007 came in dead last in our CNET antispyware testing. Ad-Aware failed to detect half of the test spyware, and unlike nine out of the 10 other antispyware apps we reviewed in December 2007, left behind traces for all but one spyware.

January 9, 2008 by in Security

Billion Electric BiGuard S20

Billion Electric BiGuard S20

This SSL VPN appliance suffers from an awkward admin interface and depends on ActiveX for some functionality, but it's still a relatively simple way to provide remote access to network applications.

September 11, 2007 by in Security

Most Popular