Once you've done your homework, you can select the right product for the right purpose, match the product features to business needs, and leverage existing products and processes.
So do your homework: Read the vendors' glossies, review the analysts' reports, read product reviews, and when you sit down across the table from a vendor or integrator, demand technical details--and proof--on how a product will solve your IT security problems. If a vendor comes knocking with a silver bullet, run.
Mike Fratto is a senior technology editor based in Network Computing's Syracuse University Real-World Labs®; he covers all security-related topics. Prior to joining this magazine, Mike worked as an independent consultant in central New York. Write to him at [email protected].
Post a comment or question on this story.
CoreStreet: This company's credential-verification system is useful for both connected and disconnected electronic locks as well as for digital certificates
Foundstone: Foundstone's FoundScan, which won the Editor's Choice award in our vulnerability-assessment review, is one of the first VA tools to integrate an intelligent approach to asset identification and classification with conventional VA technology.