Secure Bytes audit and vulnerability assessment software Secure\nAuditor named “Versatile tool” and earn “Five Star Ratings” in SC\nMagazine Group Test\n\n Secure Bytes is really pleased to share this great news with its\nassociates that Secure Auditor has been branded as a Five Star product\nby SC Magazine August 2008 edition. SC Magazine is among the world’s\nmost prestigious Information Security magazines.\n\n In the comparative review with current available products in today’s\nmarket, Reviewers concluded the Secure Auditor evaluation with Verdict\nas a “Versatile tool.”\n\n It is summed up as a tool that “offers a great amount of flexibility\nand auditing capabilities for a broad range of different assets. We\nfind this offering to be a good value for the money.” Reviewers\ncommend Secure Auditor as intuitive to use and install. It is\nconsidered to offer great amount of flexibility and auditing\ncapabilities for a broad range of different assets and a good value\nfor the money.\n\nSecure Auditor earns highest star rating possible in overall rating\ncategory of a Comparative Review. It receives 5 out of 5 stars in\nFeatures, Performance, and Documentation categories which are being\nevaluated.\n\nSecure Auditor receives reviewers praising immediately in the\nproduct’s published review as “A suite comprised of several different\npieces designed to audit vulnerabilities across a broad range of\nsystems. Because of this thorough analysis of a range of systems,\nadministrators can be sure that all the various components across the\nnetworks are secure and up to date.”\n\nThe review continues, highlighting other areas in which the Secure\nAuditor excels.\n\nFlexibility & Performance: “This product can scan many different\nplatforms, and we found this flexibility to add greatly to the\nperformance value of the product”\n\n Intuitive to Use: “We found this product to be quite intuitive to\ninstall and use. Installation takes just a few minutes and is guided\nby an easy-to-follow setup wizard.”\n\n Management & User Interface: “Management is done through a well\norganized user interface, which is also quite intuitive to navigate.”\n\n Secure Bytes appreciate SC Magazine's product review team for\nconsidering Secure Auditor in their recent group test for\nvulnerability assessment. It is a great recognition from a trusted\nindustry leader like SC Magazine just within few months of Secure\nAuditor’s launch. It validates Secure Auditor performance and\nfeatures. You can find more information and detailed review about\nSecure Auditor from following link.\n\n[URL]http://www.scmagazineus.com/Secure-Auditor-20/Review/2526/[/URL]\n\n You can get more information about Secure Auditor functionality and\nfeatures at [URL="http://www.secure-bytes.com"]www.secure-bytes.com[/URL] or email me or sales at sales@secure-\nbytes.com. Your cooperation is highly appreciated. Any inconvenience\ncaused is regretted. Many Thanks.