Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Security Week: March 30th, 2015
Linux Advisory Watch: March 27th, 2015
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

ISS discusses its security procedures Print E-mail
User Rating:      How can I rate this item?
Source: ComputerWorld AU - Posted by Benjamin D. Thomas   
Security Internet Security Systems Chairman, CEO and President Tom Noonan says customers increasingly are looking for security platforms that do two basic things: Let the good guys in and keep the bad guys out. He spoke with Network World's Editor in Chief John Dix and News Editor Bob Brown. Here is an edited transcript of Noonan's thoughts on a host of topics.

Today the argument is more platforms vs. suites. Best-of-breed product companies don't exist in any way, shape or form anymore. The vast majority of our customers are asking us to do more. They can't maintain all these relationships with tiny security companies. Point products don't address the evolution of threats on the network either. The industry has been reacting for over a decade in a short-term, pragmatic way to new threats. When the threat was spam, we had an anti-spam device. When we discovered spyware, we got anti-spyware products. Next year when the threat is lions, tigers and bears, we'll have anti-lion, anti-tiger and anti-bear products. But I have corporations saying: Time out. I can't keep adding another box on each network connection or another software application on the desktop. That's why we're offering a system to control any kind of threat and that's extensible.

Read this full article at ComputerWorld AU

Only registered users can write comments.
Please login or register.

Powered by AkoComment!

< Prev   Next >


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2015 Guardian Digital, Inc. All rights reserved.