Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

3/30/2009
01:56 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

St. Bernard Publishes Report On TCO Of Three Leading Web Filters

Report compares four key areas of midenterprise IT work hours among St. Bernard, Websense, and SurfControl Internet filtering solutions

San Diego, CA -- March 30, 2009 -- St. Bernard Software, Inc. (OTCBB: SBSW), a leader in Web security appliances, in conjunction with marketing consulting firm Robert Hale and Associates, today announced findings of a new independent US market study quantifying four key areas of mid-enterprise IT work hours amongst St. Bernard, Websense and SurfControl Internet filtering solutions. The study identified that cumulatively for the year, St. Bernard customers saved on average more than 500 hours a year managing tasks associated with Web filtering versus Websense.

As the first industry report of its kind, the study provides an objective measurement of IT time and investment for each Web filtering solution in the following key areas: set up and installation, management and administration, hardware maintenance and reporting. Across these areas, St. Bernard customers spent on average just over 483 hours installing and maintaining their product, compared to 1040 hours for Websense and 909 hours for SurfControl's solutions.

The study also illustrated further detail, as follows: > Installation hours averaged as follows: 19 hours for St. Bernard, 38 hours for Websense, and 39 hours for SurfControl > Maintenance hours per month averaged as follows: 14 hours for St. Bernard, 27 hours for Websense and 26 hours for SurfControl

The study found no difference across vendors relative to Web use, Internet policy creation, Internet policy enforcement and reporting activities.

Robert Hale and Associates conducted the survey with a sample of 300 mid-enterprise IT professionals from the commercial, financial, healthcare and manufacturing industries, with100 organizations for each Web filter vendor. The respondents were selected randomly from a database of companies sized 250 " 1,000 employees. The results are significant at the 95% level of confidence, and show important differences between St. Bernard, Websense and SurfControl in each of the four measured areas.

For more information about the study and the summary report, please visit www.webfiltertco.com

For more information regarding St. Bernard please visit www.stbernard.com or call 1-800-782-3762.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
US Capitol Attack a Wake-up Call for the Integration of Physical & IT Security
Seth Rosenblatt, Contributing Writer,  1/11/2021
IoT Vendor Ubiquiti Suffers Data Breach
Dark Reading Staff 1/11/2021
The Data-Centric Path to Zero Trust
Altaz Valani, Director of Insights Research, Security Compass,  1/13/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-7343
PUBLISHED: 2021-01-18
Missing Authorization vulnerability in McAfee Agent (MA) for Windows prior to 5.7.1 allows local users to block McAfee product updates by manipulating a directory used by MA for temporary files. The product would continue to function with out-of-date detection files.
CVE-2020-28476
PUBLISHED: 2021-01-18
All versions of package tornado are vulnerable to Web Cache Poisoning by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configura...
CVE-2020-28473
PUBLISHED: 2021-01-18
The package bottle from 0 and before 0.12.19 are vulnerable to Web Cache Poisoning by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with defa...
CVE-2021-25173
PUBLISHED: 2021-01-18
An issue was discovered in Open Design Alliance Drawings SDK before 2021.12. A memory allocation with excessive size vulnerability exists when reading malformed DGN files, which allows attackers to cause a crash, potentially enabling denial of service (crash, exit, or restart).
CVE-2021-25174
PUBLISHED: 2021-01-18
An issue was discovered in Open Design Alliance Drawings SDK before 2021.12. A memory corruption vulnerability exists when reading malformed DGN files. It can allow attackers to cause a crash, potentially enabling denial of service (Crash, Exit, or Restart).