August 2009 cover image
Government entities are likely ill-prepared for a coordinated cyberattack.
IT managers can't anticipate the news, or even where malicious attacks will appear. However, they can take steps to avoid vulnerabilities in anticipation of future ...
As citizens, we should expect to be provided with a yardstick by which we may measure our confidence in protection. After all, we are not ...
We're always happy to hear from you, our readers. Please send your comments, praise or criticisms to scfeedbackUS@haymarketmedia.com. We reserve the right to edit letters.
Web browsers of every brand and flavor are falling victim to financially motivated attacks, reports Deb Radcliff.
Users of social networking sites are feeling the stress of cybercrooks, says Virginia Tech's Randy Marchany. Dan Kaplan investigates.
The uprising in Iran following its presidential election exhibits the first large-scale cyber conflict in history, opines Peter Stephenson.
The IT staff at the San Diego Unified Port District found a way to enhance its operational controls, reports Greg Masters.
Owing to government and health care deployments, PKI is still a very active player in the encryption market, reports Chuck Miller.
Ensim Unify Password Manager Enterprise Edition provides a simple and centralized interface for administrators to enforce their password policies within the enterprise.
Hitachi ID Privileged Password Manager is a system for securing privileged passwords across large numbers of devices.
The Enterprise Random Password Manager from Lieberman Software is an extremely powerful tool which automatically discovers, updates, stores and allows secure recovery of every privileged ...
NetWrix Privileged Account Manager provides a web-based password repository for privileged accounts on Windows Server systems and shared Active Directory domain accounts, eliminating the need ...
The v-GO Access Accelerator Suite is a full-scale, totally customizable password provisioning and management product.
Secret Server uses AES 256-bit encryption and role-based permissions to securely control access to privileged passwords and other sensitive information in a central web-based repository.
ManageEngine Password Manager Pro offers the ability to securely store, access and manage shared administrative passwords.
Check Point’s Pointsec Mobile v3.4.3 is an endpoint device encryption solution for smartphones and PDAs. The platform includes support for Symbian, Palm and Windows mobile ...
DeviceLock is a port-device access, audit and data shadow control solution for the enterprise.
F-Secure’s Mobile Security for Business v5 offers protection for business smartphones and can be centralized for protection monitoring by IT administrators.
With McAfee Endpoint Encryption for Mobile (EEMO) v2.4.1, users can create encrypted space on both internal and removable storage on portable devices, such as smartphones ...
StormShield Device Control System v5.1 is part of the StormShield integrated offering. StormShield is a distributed protection system that covers all of the workstations belonging ...
The Security Shield Enterprise Edition v8.2.2 from SMobile Systems provides anti-malware and anti-spam protection, a firewall, remote lock and wipe, backup and restore, GPS tracking ...
Trend Micro Mobile Security TMMS v5.1 protects smartphones from data loss, infections and attacks. Part of a central enterprise console, Trend Micro’s OfficeScan v8, it ...
Identity Finder starts with a very simple premise: If you want to keep data from leaking, protect it where it lies. That way, if someone ...