Show all Security Software Manufacturers

Purpose

 

Security software is used to restrict access to data, files, and users on a computer or server.

 

 

Security Software InformationTypes

 

Products include:

  • Firewalls
  • Antivirus software
  • Anti-spyware
  • Anti-phishing software
  • LAN/WAN security
  • Data encryption
  • Wireless network security

 

How it Works 

 

Networks

 

Most network security software include packet sniffers and loggers for tracking potentially malicious traffic. These system administration products use a combination of hardware and software to prevent such traffic from entering the network. For example, security specialists often implement firewall server software that is designed to open or close certain ports; configure black, white, and gray lists for email; and act as a DMZ (demilitarized zone) between the Internet and an external network. 

 

Wireless networks use a common security software configuration model called wired equivalency privacy (WEP) to prevent hacking into wireless access points and tunneling into wireless network ports. 

 

Email and Internet

 

Security software provides protections for e-mail and Internet access. Email security software can include antivirus applications that scan HTML-based emails and email attachments for worms, Trojans, and malicious scripts. 

 

Common types of Internet security software use anti-phishing applications to prevent the logging of personal information in an unsecured or malicious Web site. 

 

Anti-spyware software provides protection against:

  • Malicious startup scripts
  • Exploits (e.g., buffer overflow handling)
  • Browser help object (BHO) threats
  • Keyloggers
  • Pop-up ads
  • Adware injectors 

Applications

 

Application security is a highly desirable feature in security software products. Systems administrators use data encryption software to protect corporate information stored by applications within a database. This type of software generally uses an algorithm of combined security features including user names, passwords, and encryption keys to insure that only authorized users have access to sensitive datasets.

 

One specific type of data encryption involves the use of secure content management software to protect content management systems that contain sensitive information. A common application of such software is on corporate intranets.


Purchasing Options

 

Most security software products are supplied as solution suites that can provide modular or comprehensive (all-inclusive) toolsets. Costs vary based on the level of modularization and customization required.

 

  

Standards

 

BS ISO/IEC 27002 - Information Technology - security techniques - code of practice for information security controls.

 

 

References

 

Image Credit: GE Digital Energy