Based on a wide range of security-related issues, the Information Security Software Evaluation Report covers both solution suites and individual software packages. Organizations can evaluate the capabilities of different vendors' firewall, intrusion detection, anti-virus, virtual private network, public key infrastructure, cryptography, and other enterprise security solutions. more details
Firewalls protect enterprise computer systems from attacks by individuals wishing to crack or otherwise compromise an internal network. The firewall Software Evaluation Report addresses requirements for network interfaces and protocols, content filters, VPN capacity, and other security characteristics. more details
Get everything you need to make an informed, impartial software selection in TEC's evaluation centers. From research to vendor data, reports and templates, and access to the TEC Advisor software selection system.