April 2011 Issue of SCMagazine
Despite the lip service given to the nebulous concept of partnerships between public and private entities, what really has seen the light of day?
News briefs: Anonymous strikes again, Chinese hackers penetrate Morgan Stanley, FTC goes after spam operator and more
Anonymous strikes again, Chinese hackers attack Morgan Stanley, and other news from the past month.
The Financial Stability Industry Council has appointed its first executive director, HyTrust names a new chairman and CEO, and other company news.
Threat of the month
2 minutes on
Do revelations stemming from the Anonymous hack that HBGary Federal was engaged in shady, potentially illegal, activities cast the security industry as a whole in ...
Skills in Demand
Cloud/security knowledge is in demand within such professions as network engineer, solutions architect, sales engineers and sales manager.
Me and my job
Ron Woerner, director of cybersecurity studies, College of Information Technology, Bellevue University, answers a few questions about his position.
Two sides weigh in on whether so-called do-not-track applications, which monitor consumers' online behavior, should be regulated.
Organizations of all sizes have different security needs and priorities, and are looking for flexible solutions that enable them to create their own portfolios.
You need data safeguards for multifunction printers.
All around the world, organizations are moving toward the adoption of updated PCI standards so that they can begin 2012 with assessments against the newest ...
The cyberattack last summer on Iran's nuclear facilities has upped the ante for decision-makers in charge of critical infrastructure and enterprise networks, reports Greg Masters.
Corporate account takeover remains prevalent, resulting in $87.5 million in losses last year. But all banks can strive to prevent it, while staying within budget, ...
Winners of the 2011 SC Awards U.S., honoring those companies and individuals that have most strongly contributed to the vitality of the industry, were announced ...
For many small and midsize businesses, neglecting IT security is a thing of the past, reports Angela Moscaritolo.
A prudent firm should not wait until a clear and direct obligation exists before taking steps to secure its systems and processes.
UTMs and anti-malware gateways often are our key protection at the perimeter, says Peter Stephenson, SC Magazine's technology editor.
Group Test 1
M86 Security’s real-time web security solution is intended to provide zero-hour protection against known and unknown web attacks, without dependence on signature-based patches or updates.
The McAfee Email and Web Security Appliance scans inbound and outbound email and web traffic.
The ProSecure Web/Email Security Threat Management Appliance is an appliance-based, web and email security solution that protects the network perimeter against web-borne threats from spyware, ...
Panda GateDefender Performa is a scalable, secure content management perimeter security appliance.
SonicWALL NSA 3500 is designed to provide multipronged protection at the gateway against malware, spyware and other threats through the Gateway Anti-Virus and Anti-Spyware, Anti-Spam ...
Trend Micro’s Enterprise Security for Gateways integrates web and messaging gateway security to protect against incoming or outgoing web, email and blended threats.
Wedge Networks’ BeSecure NDP-1005G is a content inspection and filtering network appliance that offers a complete solution for protecting network endpoints from spyware, trojans, worms ...
Group Test 2
The NetVanta from ADTRAN is powered by SonicWALL OS to provide solid gateway security.
Aside from solid web content management and application control, the Astaro Security Gateway offers a fully configurable firewall and intrusion prevention system, including port scan ...
The Cyberoam CR100ia from Elitecore Technologies provides solid gateway protection features above and beyond the usual UTM feature set.
The InstaGate 604 from eSoft provides full UTM protection to the small to midsize business environment.
The FortiGate 60c from Fortinet provides quite a bit of power packed into a small appliance.
Built for the large enterprise, the gateProtect GPZ 2500 features best-of-breed, gateway-based malware protection, including anti-virus from Kaspersky and anti-spam from Commtouch, as well as ...
The ProSecure UTM from NETGEAR offers a stateful packet inspection firewall, IPS, SSL VPN, IPsec VPN, anti-malware, anti-spam, web URL filtering and application control.
The GateDefender Integra from Panda Security features a firewall that not only filters based on static rules but also can provide dynamic application-level protection.
The Protector from SecPoint offers a combination of anti-virus, intrusion prevention system, web content filtering, application protocol blocking and spam protection in one appliance.
The VASCO aXsGUARD Gatekeeper Enterprise 7 offers an interesting set of features above and beyond the usual UTM functionality.
The WatchGuard XTM offers full UTM capabilities in a solid, easy-to-use appliance.
The ZyWALL USG50 from ZyXEL offers a lot of solid UTM functionality in a small device.
Trusted Access for Banking from IronKey provides assured, secure online banking connection for commercial banking customers.
Sign up to our newsletters
SC Magazine Articles
- APT operation 'Double Tap' exploits serious Windows OLE bug
- 'DoubleDirect' MitM attack affects iOS, Android and OS X users
- Man gets 18 months in prison for accessing Subway POS devices, loading up gift cards
- The Internet of Things (IoT) will fail if security has no context
- Regin: nation-state possibly behind the stealthy modular spying malware
- Operators disable firewall features to increase network performance, survey finds
- DDoS attacks cost organizations $40,000 per hour, survey finds
- Waste no time patching Windows Schannel, OLE bugs, experts warn
- Study: 68 percent of healthcare breaches caused by loss or theft of devices, files
- Spin.com redirects to Rig Exploit Kit, infects users with malware, Symantec observes
- Syrian Electronic Army redirects Gigya, briefly compromises media sites on Thanksgiving Day
- Study: 'High priority' issues hamper endpoint security solution implementation
- Researchers identify POS malware targeting ticket machines, electronic kiosks
- Pirated Joomla, WordPress, Drupal themes and plugins contain CryptoPHP backdoor
- DDoS attacks grew in size, threats became more complex, Q3 reports say