August 2007 18 8 Issue of SCMagazine

August 2007 18 8 Issue of SCMagazine

Editorial

What is Symantec's next move?

The industrys gossip grapevine lately has entwined Symantec in its grasp. Seems the company is considering going private.

Update

Company news

Here is an update from the IT security industrys boardrooms.

News briefs

Harry hack A hacker named Gabriel claimed to have breached the networks of the UKs Bloomsbury Publishing, uncovering the ending of Harry Potter and the ...

Debate

Is signature-based anti-virus dead?

2 minutes on

2 minutes on...U.S. lags in ISO 27001 compliance

American companies, while often technology leaders (both as developers and users), havent kept up with their Asian counterparts in how they approach security. They take ...

Me and my job

Me and my job

Marty Hodgett, CIO, Orchard Supply Hardware, answers SC Magazine's questions about his job.

Opinion

Everyday information security

There is a general belief by end-users and executives that most information security incidents contain a level of extraordinary activity and usually do not occur ...

Understand risk analysis

It appears that today, business contingency, disaster recovery, and compliance are the hot phrases in information technology circles. Risk analysis in particular, is grossly misunderstood ...

CSO's desk

Get familiar with the back door

One of the most common concerns I find when asking security managers about their legacy physical security systems is that, generally, they are not very ...

Features

Product section: Convergence and emergence

This month we saw the effects of the market in both of our product test groups. In one case, IDS/IPS, we saw for the first ...

The financial vertical: How institutions protect data - from unaware employees and outsiders

Banks and financial institutions are targets not only because, in the words of bank-robber Willy Sutton, thats where the money is, but because they are ...

The financial vertical: Five ways to protect data and IP

Recent headlines illustrate that data breaches continue to occur across all industries. The Privacy Rights Clearinghouse reports that more than 155 million records including sensitive ...

FFIEC guidelines mandate financial services security upgrades

What began as a frantic effort to meet federally mandated personal authentication guidelines for online banking has morphed into a drive to boost the bottom ...

Special section: IT security and the financial vertical

In this special section, we look at how the IT security industry works to protect banks and financial institutions and keeps up with the rise ...

Developers of Web 2.0 apps must build in security from the start

When notice of a widespread phishing attack against MySpace members was posted in a June Google security blog, Colin Whittaker, a Google anti-phishing team member ...

Cover story: Protecting credit card numbers has a positive impact on business

When the Steak n Shake Company began accepting credit cards a few years ago as a way to increase revenue and appease its plastic-friendly clientele, ...

Last Word

A holistic and proactive approach to preventing data theft

Recent high profile data breaches have underscored the need for robust information security within organizations. But with names like Pfizer, TJX and the Department of ...

Product Reviews

Application Security Inc. AppDetectivePro

AppDetectivePro primarily looks for security holes inside of a number of popular database servers. The user interface makes it easy to determine which steps of ...

CounterSnipe Technologies Active Protection Software 3.0

This software-only product can be deployed as an inline IDS, inline IPS, or deployed off of a tap. Additionally, it can provide detailed threat and ...

RadWare DefensePro, Version 3.10

The RadWare DefensePro is an appliance-based product that requires the RadWare InSite appliance for configuration and management. Together these two products are feature-rich and offer ...

SecurityMetrics IDS/IPS

This device is like a slightly stripped down version of a unified threat manager (UTM). The SecurityMetrics IDS/IPS not only includes IDS/IPS functionality, but it ...

Reflex Security Interceptor 1000

The Reflex Interceptor 1000 is an IPS with a twist. This appliance not only has a highly capable IPS with protection for such vectors as ...

Top Layer IPS 5500-150E v 5.12

The Top Layer IPS offers good protection features. This product includes what Top Layer calls Three Dimensional Protection. This device uses the IPS for protection ...

NitroSecurity NitroGuard IPS

The NitroGuard IPS is part of the NitroView suite of products available from NitroSecurity. It is one of a handful of IPS products that allows ...

IBM-ISS Proventia IPS GX6116

The Proventia IPS GX6116 could be considered the high-end sports car of IPS appliances. Not only does this device include several protection and analysis features ...

Watchfire AppScan 7.5

Watchfire AppScan is a software-based offering, which runs from the Windows platform. You may remember earlier versions of AppScan that required a Linux-based server and ...

SPI Dynamics Assessment Management Platform

The SPI Dynamics Assessment Management Platform (AMP) is an appliance-based offering. The core component of the AMP offering is the WebInspect application, which is well ...

Cenzic Hailstorm

The Cenzic Hailstorm offering is a software-based solution which truly performs application vulnerability assessment. Once the product is up and running, the wizard allows you ...

Ounce Labs Ounce 4

The Ounce Labs offering is a software-based solution, which is actually a CASE (computer aided software engineering) utility. Ounce 4 works by reviewing code for ...

Fortify Software Source Code Analysis

The Fortify offering is a software-based solution which is also a CASE (computer aided software engineering) utility. Any source code can be reviewed with the ...

NGS Software Typhon

NGS Software Typhon is more of a traditional network vulnerability assessment tool with some application intelligence built in. The utility was able to locate FTP-based ...

Mu Security Mu 4000

There's vulnerability assessment and penetration testing, but what about vulnerability analysis? Before you tell me that I'm just playing with words, stop for a sec ...

Sign up for our newsletters

POLL