Ask FERF (financial executives research foundation) about ... IT security.

AuthorGraziano, Cheryl de Nesa
PositionResources

The outlook for the information technology (IT) sector is cautious but positive. After a relatively flat 2003, IT spending in the U.S. is predicted to rise 4 percent in 2004, according to Forrester Research, the technology research firm in Cambridge, Mass. That growth will be driven by a 6 percent rise in overall software spending, particularly from increased demands in security software. Of the 818 technology decision-makers surveyed on a list of 16 IT initiatives, more than half considered an upgrade of IT security to be a top priority for 2004.

Based on research on a number of vendors, Financial Executives Research Foundation (FERF) provides the following information to explain what each company is offering in the area of information security. The list is not exhaustive, and vendors are listed alphabetically.

Cheryl de Mesa Graziano, CPA (cgraziano@fei.org) is Director of Research with Financial Executives Research Foundation (FERF).

Vendor Name Product Product Name Description Area of Specialization Citadel Security Software Scans networks to identify security Hercules weaknesses. Network vulnerability Provides the means to automate the scanner resolution of those vulnerabilities. www.citadel.com Postini Protects company email systems from Perimeter Manager spam and email viruses and provides Email security management of email collection and www.postini.com delivery. Sigaba Provides a single platform for secure Secure E-mail messaging. Enables easy but safe Email security exchange of sensitive information www.sigaba.com across both wired and wireless networks (email, LANs, desktop-to-desktop). Trend Micro Repairs systems infected by viruses and Damage Cleanup Services worms without installing software at System virus repair client site. Web-based console is used www.trendmicro.com to centrally manage tasks and deploy cleanup for multiple users. TrueActive Software Protects against internal security WinWhatWhere threats. Specifically tracks all PC Computer activity activities (keystrokes, Internet use, monitoring email, file activity) to detect and www.trueactive.com verify potential computer misuse. Vendor Name Features Product Name Area of Specialization Citadel Security...

To continue reading

Request your trial

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT