About Product Reviews
SC Magazine Product Reviews
Starting with a goal some seven years ago to include more and varied products and services in our monthly Group Tests and First Looks, we established our U.S.-based testing team, which includes SC Magazine Lab staff and a network of external experts who are respected industrywide.
The diligence and commitment to excellence made by these staff and other members of our editorial team have made our Product Reviews one of the most well-read sections of our magazine and website. As a result, they remain the most objective, thorough and best in the industry.
In our Group Tests each month, we look at several products around a common theme based on a predetermined set of SC Labs standards (performance, ease of use, features, documentation, support, and value for money). There are roughly 50 individual criteria in the general test process. These criteria were developed by the SC Magazine Lab in cooperation with the Center for Regional and National Security at Eastern Michigan University.
We developed second sets of standards specifically for the groups under test and use the Common Criteria (ISO 1548) as a basis for the test plan. Group Test reviews focus on operational characteristics and are considered at evaluation assurance level (EAL) 1 (functionally tested) or, in some cases, EAL 2 (structurally tested) in Common Criteria-speak.
Our final conclusions and ratings are subject to the judgment and interpretation of the tester and are validated by Technology Editor Peter Stephenson. All reviews are vetted for consistency, correctness and completeness by Stephenson and his team prior to being submitted for publication. All prices quoted are in American dollars.
Additionally, each December we select the past year's Innovators, those companies that have shown sustained innovation and performance and have contributed materially to the growth of our industry.
As well in December, among the Innovators, we honor a few companies with induction into the SC Magazine Hall of Fame. This is reserved for our best of the best. That is not a simple or knee-jerk kind of decision, either. There are lots of organizations - large and small - that have cool products and, in fact, there are publications that address the "cool product" issue quite well. We, on the other hand, are concerned that, no matter how cool the product is, the company will be around in one form or another for quite a while.
The recipient needs to be a demonstrated innovator. That is not a one-year proposition. That means sustained performance. The company also needs to show depth. That means that not just the product or service is innovative, the organization itself must demonstrate an innovative approach to its business and the market. Third, the winners need to be responsive to real challenges, and those challenges need to be important over time to an identifiable segment of the market.
Finally, our Hall of Famers need to demonstrate in other ways - such as winning Best Buy, Recommended and other SC Magazine designations - that they have reached the level of excellence that belongs in the Hall of Fame and have sustained that level of excellence over time.
Each month, Peter Stephenson introduces the Product Section of SC Magazine. As many of our loyal readers likely are aware, Stephenson has worked with SC Magazine in some capacity for years. Indeed, his straight-talking opinions once filled our news pages in a long-standing monthly contribution that since has been taken over by a rotation of experts.
In addition to overseeing SC Magazine's reviews, Stephenson also is CISO of Norwich University. His areas of expertise include information assurance and risk, information warfare, counter-terrorism, and digital investigation and forensics. He teaches information assurance, network attack and defense, digital forensics and cyber investigation on both the graduate and undergraduate levels.
He started his 40-year career as a U.S. Navy cryptographer, then moved into the private sector where he operated his own information security consulting practice for some 20 years. Navigating the industry and his career with aplomb, he then became director of technology for the global security practice of Netigy Corporation and was, until July 2003, the director of technology and a research coordinator for QinetiQ Trusted Information Management, a large international information security professional and managed services company.
In short, Stephenson knows a thing or two about IT security.
Along with him, three other professionals work for SC Magazine Lab in the U.S.
Mike Stephenson, lab manager, maintains the test facility and ensures that the integrity of SC's improved test methodologies that use standards from the Common Criteria are upheld.
John Aitken, director of lab operations, is on hand to oversee product shipments, scheduling and other needed lab operations, while Judy Traub, editorial assistant, focuses on managing relationships and lines of communications with vendors and service providers participating in reviews.
For more information, click on the links below.
How we test
Sample product reviews submission form (PDF download)
Submit a product for review
Click here to download our 2014 editorial calendar
Sign up to our newsletters
SC Magazine Articles
- Microsoft report explores dangers of running expired security software
- Survey: real-time SIEM solutions help orgs detect attacks within minutes
- Vulnerabilities identified in three Advantech products
- Android malware 'NotCompatible' evolves, spawns resilient botnet
- State Department hack may be tied to White House network breach
- Operators disable firewall features to increase network performance, survey finds
- Waste no time patching Windows Schannel, OLE bugs, experts warn
- Study: 68 percent of healthcare breaches caused by loss or theft of devices, files
- Spin.com redirects to Rig Exploit Kit, infects users with malware, Symantec observes
- Upping the ante: PCI Security Standard
- Study: Third of employees use company devices for social media and online shopping
- 'DoubleDirect' MitM attack affects iOS, Android and OS X users
- Swedish appeals court nixes Assange's plea
- Critical XSS vulnerability addressed in WordPress
- The Internet of Things (IoT) will fail if security has no context