Unwitting Collaborators, Part 14: Security Vendor Survey
Introduction
We've shown in this series many different ways in which your organization's information network could be compromised and could become a weapon in the hands of cyberterrorists for clandestine communications, disinformation, intelligence gathering on your organizationand the ability to cause damage to our nation's information infrastructure.
If you've followed each article in the series, we informed you of the ways to close the technical and non-technical security breaches in your organization. To help in strengthening your security against technical breaches emanating from both inside and outside your network, we've compiled for your review a list of the 10 most popular security companies and their product specifications. This is a brief examination of some of the security-enhancing products already on the market.
Your IT personnel will have little trouble understanding the matrix at the end of this article. But it's important that the non-technical managers of your organization also know the most important features of a security-enhancing product, so they can be certain that these features are included in the selected security solution.