April 2010 Issue of SCMagazine
Threat of the month
2 minutes on
Google found itself in hot water with privacy advocates over Buzz, its new social networking platform.
Skills in Demand
You can translate your domain expertise into "big dollars" by migrating to a sales engineer position, says Michael Potters, CEO, The Glenmont Group.
Me and my job
Today's corporate networks are loaded with information with the potential to generate significant profit on the black market, says TippingPoint's David Endler.
Adopting cloud-based services gives organizations many benefits, but it also opens them up to many risks and vulnerabilities, says Fortinet's Anthony James.
Signature-based software just can't keep up with today's malware, says The Washington Post Co.'s Stacey Halota.
Are organizations ready to move their most sensitive enterprise applications to the cloud? Dan Kaplan investigates.
It can be easy to overlook the spirited volunteerism in the IT space, says Jake Kouns of the Open Security Foundation. Dan Kaplan reports.
During an SC Magazine Financial Services Roundtable, leading information security pros discussed how they are refining IT security tactics, and more, reports Illena Armstrong.
This month we look at the best ways to manage various forms of viruses, worms, and more.
Group Test 1
There are a number of factors to consider before bringing an anti-malware gateway into your environment, says Peter Stephenson.
The Anchiva 206 Web Gateway enforces web surfing policies and protects against web- and email-borne threats.
The Barracuda Web Filter 310 provides solid protection against web-based threats, such as viruses, worms and spyware.
The M86 Secure Web Gateway provides proactive prevention of crimeware, malware and data leakage using real-time code analysis and optional anti-virus modules.
The McAfee Email and Web Security Appliance uses a multitude of scanning techniques to analyze both web and email traffic for threats.
A full function transparent inline filter deployed at the internet gateway for seamless anti-malware control across both web and email protocols.
A full function anti-malware gateway as well as a web filter and application control gateway.
The Sophos Web Appliance uses a highly advanced system of technologies to catch and defend against web threats.
Offers protection against many malware-based threats – including viruses, spyware and phishing – in one soft appliance.
The Trend Micro Enterprise Security for Gateways is driven by the InterScan Web Security Virtual Appliance.
This appliance can handle thousands of concurrent web, email and FTP sessions and scan for all types of threats and malware.
Group Test 2
Michael Lipinski reviews technologies used to provide a central point for mitigation of the threat of malware.
The product delivers anti-spam, anti spyware, firewall, web shield, LinkScanner and anti-rootkit protection.
A robust business security and management solution that delivers proactive protection from viruses, spyware, rootkits, spam, trojan threats, phishing and other malware.
Provides automatic, centrally managed, real-time protection against online threats, such as browser exploits, viruses, spyware, riskware, zero-day attacks, rootkits and other forms of malicious code ...
A suite of products that offers security coverage for all types of network endpoints – from mobile devices to servers.
A decentralized management approach allows the endpoint device to control the execution of applications.
An anti-virus and anti-spyware product that is managed from a central console.
This tool from Passlogix is policy-driven and centrally managed making it a true enterprise-class product, says Peter Stephenson.
A lot's been done to secure the nation's critical assets, but challenges remain, says the DoD's Robert Lentz.
Sign up to our newsletters
SC Magazine Articles
- 'MEDJACK' tactic allows cyber criminals to enter healthcare networks undetected
- Samsung devices, including Galaxy S6, vulnerable to remote code execution
- Dridex banking malware spreading through new spam campaign
- U.S., China agree to cybersecurity code of conduct
- Suspicious activity on LastPass network, data compromised
- Former Georgia-Pacific sysadmin charged with damaging protected computers
- Harvard University announces network intrusion, possible data exposure
- Saboteurs leverage RIPv1 for DDoS reflection attacks
- More than 440K new Android malware strains found in Q1, study finds
- Apple releases OS X 10.10.4 and iOS 8.4, numerous bugs addressed