Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Feature: The Survivor's Guide to 2004: Security: Page 8 of 12

Once you've done your homework, you can select the right product for the right purpose, match the product features to business needs, and leverage existing products and processes.

So do your homework: Read the vendors' glossies, review the analysts' reports, read product reviews, and when you sit down across the table from a vendor or integrator, demand technical details--and proof--on how a product will solve your IT security problems. If a vendor comes knocking with a silver bullet, run.

Mike Fratto is a senior technology editor based in Network Computing's Syracuse University Real-World Labs®; he covers all security-related topics. Prior to joining this magazine, Mike worked as an independent consultant in central New York. Write to him at [email protected].

Post a comment or question on this story.

CoreStreet: This company's credential-verification system is useful for both connected and disconnected electronic locks as well as for digital certificates

Foundstone: Foundstone's FoundScan, which won the Editor's Choice award in our vulnerability-assessment review, is one of the first VA tools to integrate an intelligent approach to asset identification and classification with conventional VA technology.