01.03.2015 Views

The Changing Threat Landscape - Zift Solutions

The Changing Threat Landscape - Zift Solutions

The Changing Threat Landscape - Zift Solutions

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Comparative Testing continued<br />

product has the highest level of protection<br />

and warnings.<br />

Of the three products examined in the test<br />

program, Trend Micro WFBS-A was also<br />

found to be the only product that caters<br />

specifically to the use of wireless devices.<br />

Trend Micro’s Wi-Fi Advisor - a second<br />

utility provided by the Transaction Protector<br />

technology - offered warnings when the<br />

safety of a wireless network was uncertain-<br />

-a critical feature in reminding users to be<br />

extra-cautious with sensitive data when<br />

they can’t be assured of the safety of the<br />

Wi-Fi connection they’re on.<br />

Trend Micro WFBS-A has three more<br />

advanced security functions: the Firewall,<br />

an Intrusion Detection System and<br />

the Vulnerability Assessment Scanner.<br />

While the competitors’ firewall and IPS<br />

technology prevented the threat attacks<br />

against which they were tested and<br />

provided logs to show evidence that<br />

intrusion attempts were taking place, only<br />

the Trend Micro solution provided an<br />

accurate report of the scale and nature of<br />

the attacks and broke down the attempts<br />

into individual entries for later analysis.<br />

Trend Micro WFBS-A allowed scans<br />

of client machines to be initiated from the<br />

Administration console and the resulting<br />

reports for these scans included links for<br />

remediation advice and any required patch.<br />

Both these features are invaluable to resellers,<br />

IT, or Security staff, as it allows them to<br />

remotely ensure machines are up-to date, and<br />

to analyse any attacks found by the IPS to help<br />

prevent future attacks.<br />

With the Security Dashboard, resellers, IT, or<br />

Security staff can keep track of activities within<br />

their network. This shows a complete listing<br />

of events which have occurred with client<br />

machines.<br />

10

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!