Skip to content

TechRepublic

  • Top Products
  • AI
  • Developer
  • Payroll
  • Security
  • Project Management
  • TechRepublic Academy
  • Innovation
  • Cheat Sheets
  • Big Data
  • Tech Jobs
  • TechRepublic Premium
  • Top Products
  • AI
  • Developer
  • Payroll
  • Security
  • Project Management
  • TechRepublic Academy
  • Innovation
  • Cheat Sheets
  • Big Data
  • Tech Jobs
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium
Hardware

Images: Security battle for the desktop

By Bill Detwiler September 19, 2006, 7:08 AM PDT on Twitter billdetwiler

Image
1
of 6

Windows Security Center in Vista
Windows Security Center in Vista
Images: Security battle for the desktop

CNET News.com

This is a screenshot of Windows Security Center in Vista, the beefed-up successor to Windows XP, which Microsoft refers to it as “The voice of security for Windows Vista.”

rnrnIn Vista, Windows Security Center reports on firewall, antivirus, spyware protection, Internet security settings, and Windows security technology called User Account Control. The feature sits in the Windows Control Panel and pops up any time there is a security alert, such as when antivirus protection is disabled or the firewall is turned off.

rnrnWindows Security Center also can be used to manage security tools in Vista. For example, a user could update antivirus definitions or disable a firewall directly from the Windows Security Center, according to a recently published Microsoft document on the feature. In Windows XP Service Pack 2, which first included the Windows Security Center, the feature only displays the status of the firewall, antivirus and automatic updates.

CNET News.com
Images: Security battle for the desktop

Images: Security battle for the desktop

Symantec’s Norton Protection Center includes the basics on firewall, virus and spyware shield status, but also tells the user that they need to do a full system security scan and gives options to learn about other security topics such as Web and online transaction security.

Images: Security battle for the desktop

Trend Micro’s PC-cillin Internet Security 2007 has separate buttons for different components of the suite. The overview page shows a very general “protection status” and can tell a user if they need to, for example, run a security scan.

Images: Security battle for the desktop

McAfee’s SecurityCenter is elaborate. It includes status indicators on e-mail and instant messaging protection, for example, which Microsoft does not offer in Windows Security Center. It also lets users drill deep into the security settings of their PC and fix problems.

Images: Security battle for the desktop

The management console in ZoneAlarm Internet Security Suite displays more detailed and in-depth security information than the Windows Security Center and includes tabs to drill deeper. The overview screen shows details about the firewall settings and the user is told about e-mail and instant messaging protections, indicators Windows Security does not have.

  • Hardware
  • Account Information

    Share with Your Friends

    Images: Security battle for the desktop

    Your email has been sent

Share: Images: Security battle for the desktop
Image of Bill Detwiler
By Bill Detwiler
Bill Detwiler is the Editor for Technical Content and Ecosystem at Celonis. He is the former Editor in Chief of TechRepublic and previous host of TechRepublic's Dynamic Developer podcast and Cracking Open, CNET and TechRepublic's popular online show.
  • Account Information

    Contact Bill Detwiler

    Your message has been sent

  • |
  • See all of Bill's content

Daily Tech Insider

If you can only read one tech story a day, this is it.

TechRepublic Premium

  • TechRepublic Premium

    Incident Reporting and Response Procedures Policy

    The purpose of the Incident Reporting and Response Procedures Policy from TechRepublic Premium is to establish a clear and efficient process for employees to report security breaches, device loss, or data exposure incidents involving personal devices used for work purposes. From the policy: CONFIDENTIAL REPORTING Employees are strongly encouraged to promptly report incidents, and they ...

    Downloads
    Published:  December 7, 2023, 4:00 PM EST Modified:  December 8, 2023, 8:02 AM EST Read More See more TechRepublic Premium articles
  • TechRepublic Premium

    Quick Glossary: Cryptocurrency

    Cryptocurrency is a popular technological worldwide trend. As with any investing avenue, the revenue one can make dealing in cryptocurrency can vary depending on the time put into the endeavors, market fluctuation, choice of investments, available capital, how loss averse you are, your short- and long-term strategies and other traditional investment factors. Be forewarned, scams ...

    Published:  December 6, 2023, 4:00 PM EST Modified:  December 7, 2023, 9:00 AM EST Read More See more TechRepublic Premium articles
  • TechRepublic Premium

    What Is Artificial General Intelligence?

    Artificial general intelligence, or AGI, is a hypothetical form of AI designed to perform human-level cognitive functions, such as the capacity to self-teach. AGI is regarded as very powerful since it can autonomously solve a wide variety of cognitive tasks, as opposed to weak or narrow AI systems that carry out only particular or specialized ...

    Downloads
    Published:  December 6, 2023, 4:00 PM EST Modified:  December 7, 2023, 7:51 AM EST Read More See more TechRepublic Premium articles
  • TechRepublic Premium

    Hiring Kit: Blockchain Engineer

    Moving well-beyond its cryptocurrency roots, blockchain technology has quickly become a sought-after component of application development in the modern business enterprise. Recruiting candidates with advanced software engineering experience and at least some familiarity with applied blockchain technology will take time and effort. This hiring kit from TechRepublic Premium provides a workable framework you can use ...

    Downloads
    Published:  December 6, 2023, 4:00 PM EST Modified:  December 7, 2023, 9:00 AM EST Read More See more TechRepublic Premium articles

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information
  • Careers

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • Editorial Policy
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2023 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice
CLOSE

Create a TechRepublic Account

Get the web's best business technology news, tutorials, reviews, trends, and analysis—in your inbox. Let's start with the basics.

Already registered? Sign In
Use Facebook
Use Linkedin

* - indicates required fields

CLOSE

Sign in to TechRepublic

Not a member? Create an account
Use Facebook
Use Linkedin

Lost your password? Request a new password

CLOSE

Reset Password

Please enter your email adress. You will receive an email message with instructions on how to reset your password.

Check your email for a password reset link. If you didn't receive an email don't forgot to check your spam folder, otherwise contact support.

Back to login
1 Finish Profile
2 Newsletter Preferences
CLOSE

Welcome. Tell us a little bit about you.

This will help us provide you with customized content.

No thanks, continue without
1 Finish Profile
2 Newsletter Preferences
CLOSE

Want to receive more TechRepublic news?

Newsletter Name
Subscribe
Daily Tech Insider
Daily Tech Insider AU
TechRepublic UK
TechRepublic News and Special Offers
TechRepublic News and Special Offers International
Executive Briefing
Innovation Insider
Project Management Insider
Microsoft Weekly
Cloud Insider
Data Insider
Developer Insider
TechRepublic Premium
Apple Weekly
Cybersecurity Insider
Google Weekly
Toggle All
No thanks, continue without

You're All Set

Thanks for signing up! Keep an eye out for a confirmation email from our team. To ensure any newsletters you subscribed to hit your inbox, make sure to add newsletters@nl.technologyadvice.com to your contacts list.

Back to Home Page