close

Mcafee Removal Tool Endpoint Security

Introduction

        This site is intended to make real reviews on all the Information Technology Security products I’m working daily. Of course there is other software that comes to my attention but I have experience only in a lab environment. On this site there will be no articles written by me about a product I haven’t tested myself.

       Besides the main topic regarding my experience in IT Security Products, this site is open to any other contributors if they have real life experience with any software used at the moment.

     Also there is a “How to do” section where I intend to post some tips and tricks from my experience, issues solved by me, open also for other contributors to bring their knowledge and help anyone in the world who has similar problems.

      In my Information Technology Security service provider career I tried to cover the whole security life cycle in a company, from the perimeter to the endpoint. To achieve my goal I picked up some of the best vendors for each part of the IT Security life cycle in an enterprise environment.

The vendors I have been working mostly till now are:

– McAfee (re-branded as Intel Security since the beginning of 2015) – covers probably the whole IT Security life cycle (Firewall, IPS, Web and Email protection, Endpoint protection, Asset Management, Vulnerability Scanner, SIEM, DLP) – – Checkpoint – best firewalls but they also expanded to other IT Security products – – Fireeye – sandboxing technology – – TITUS – Data Classification – – Websense – Web and Email security, Data Loss Prevention – – Imperva – Web Application Firewall, Database Firewall – – MobileIron – Mobile Device Management software for smartphones and tablets – – Juniper – best SSL VPN (my opinion), switches, routers (a good competitor for CISCO) – – Qualys – Vulnerability Scanning, Asset Management –

The list will continue in time with some other vendor’s products I will have the opportunity to work with in implementations or just test them in my lab environment.

If you have any question about the products presented or need help in configuring one, don’t hesitate to write a comment and I will try to answer you as soon as possible.


endpoint security download checkpoint     endpoint security blog

TAGS

CATEGORIES