[Last Call] Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

Opinions wanted on Prevx

Posted on 2004-11-12
3
Medium Priority
?
239 Views
Last Modified: 2010-04-11
http://www1.prevx.com/prevxenterprise.asp

Has anyone used this product?

any experiences.
the network that is considering it is as follows,

2003 AD Server and File server, etc
Windows XP clients
Nortons coporate Edition AV on server and desktops
Watchguard Firebox X 500
0
Comment
Question by:Raybans
  • 2
3 Comments
 
LVL 15

Expert Comment

by:Cyber-Dude
ID: 12579391
I dont know that product but I think the following link may help you in determining what AV software to use (though from what I gathered; Prevx solution is a more comprehancive one):
http://www.virusbtn.com/vb100/archives/products.xml

Hope that helped a little;

Cyber
0
 
LVL 2

Author Comment

by:Raybans
ID: 12580759
the question is not which AV software to use.

the question is related to IDS.

the AV question has been settled a long time ago, and what is listed is what we are and will be using
0
 
LVL 15

Accepted Solution

by:
Cyber-Dude earned 1000 total points
ID: 12581370
I should have seen better;
I would check the possibility of purchasing an IDS/IPS systems for those systems are more active and allows you to build rules of engagement. ISS is one of the industries leader, I would give it a shot... As for the specific product you are asking for; as I said... I dont know it...

Links
ISS Home Page:
http://www.iss.net/

A great article on market share (checkout page 62~73; but you can read the whole intresting document):
http://www.wins21.com/down/usa%20security_eng.pdf

And ICSLabs:
http://www.icsalabs.com/

Good luck

Cyber
0

Featured Post

What Security Threats Are We Predicting for 2018?

Cryptocurrency, IoT botnets, MFA, and more! Hackers are already planning their next big attacks for 2018. Learn what you might face, and how to defend against it with our 2018 security predictions.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Sometimes Administrators rights are not enough. These cases call for the SYSTEM account. The process in this article outlines the steps required to execute commands using the SYSTEM account.
Last month Marc Laliberte, WatchGuard’s Senior Threat Analyst, contributed reviewed the three major email authentication anti-phishing technology standards: SPF, DKIM, and DMARC. Learn more in part 2 of the series originally posted in Cyber Defense …
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

830 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question