The Changing Threat Landscape - Zift Solutions
The Changing Threat Landscape - Zift Solutions
The Changing Threat Landscape - Zift Solutions
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Comparative Testing continued<br />
product has the highest level of protection<br />
and warnings.<br />
Of the three products examined in the test<br />
program, Trend Micro WFBS-A was also<br />
found to be the only product that caters<br />
specifically to the use of wireless devices.<br />
Trend Micro’s Wi-Fi Advisor - a second<br />
utility provided by the Transaction Protector<br />
technology - offered warnings when the<br />
safety of a wireless network was uncertain-<br />
-a critical feature in reminding users to be<br />
extra-cautious with sensitive data when<br />
they can’t be assured of the safety of the<br />
Wi-Fi connection they’re on.<br />
Trend Micro WFBS-A has three more<br />
advanced security functions: the Firewall,<br />
an Intrusion Detection System and<br />
the Vulnerability Assessment Scanner.<br />
While the competitors’ firewall and IPS<br />
technology prevented the threat attacks<br />
against which they were tested and<br />
provided logs to show evidence that<br />
intrusion attempts were taking place, only<br />
the Trend Micro solution provided an<br />
accurate report of the scale and nature of<br />
the attacks and broke down the attempts<br />
into individual entries for later analysis.<br />
Trend Micro WFBS-A allowed scans<br />
of client machines to be initiated from the<br />
Administration console and the resulting<br />
reports for these scans included links for<br />
remediation advice and any required patch.<br />
Both these features are invaluable to resellers,<br />
IT, or Security staff, as it allows them to<br />
remotely ensure machines are up-to date, and<br />
to analyse any attacks found by the IPS to help<br />
prevent future attacks.<br />
With the Security Dashboard, resellers, IT, or<br />
Security staff can keep track of activities within<br />
their network. This shows a complete listing<br />
of events which have occurred with client<br />
machines.<br />
10