August 2013 Issue of SCMagazine
Among other informative articles covering the industry, our August issue includes features on insider threats and the payment card industry.
Federal agencies tasked with Americans' safety can find other ways to fulfill their duties without stomping all over the U.S. Constitution and Bill of Rights.
A retired U.S. Marine general may be the source of the public disclosure of Stuxnet, an easy-to-exploit Facebook vulnerability was unveiled, and other news around ...
Former Booz Hamilton contractor Edward Snowden was no ordinary insider when he stole NSA data. To the contrary, he had every intention to purloin top-secret ...
This month's company news includes the departures of Graham Cluley and Carole Theriault from Sophos, the acquisition of Aveksa by EMC, and more.
Threat of the month
Malware is increasingly being created for tablets and smartphones, and that is our threat of the month.
Skills in Demand
Enterprise resource planning (ERP) solutions provide the core IT systems for a business, and include financial, accounting, sales and other apps. As a result, experienced ...
Me and my job
This month's "Me and My Job" features Sasan Hamidi, CISO at Interval International.
Debate: Security training is effective in preventing workers from clicking on malicious links and attachments.
In this month's debate, two experts discuss whether security training is an effective strategy in the workplace.
Organizations today have a master data model to drive efficiencies in system design. How about a similar approach for the enterprise security program?
Services abound for business continuity and disaster recovery in the cloud, but what's the right choice for your firm? Alan Earls investigates.
Threats from inside an organization - and from third-parties - pose a burgeoning challenge for security professionals, reports Jim Romeo.
An upcoming update of a credit card standard offers an opportunity to assess overall security, says Symcor's Della Shea. James Hale reports.
The endpoint has taken on both new importance and new dimensions in the overall information protection scheme.
Group Test 1
Endpoint Protector 4 from CoSoSys provides endpoint protection through the use of three feature-rich modules
This product is quite comprehensive and has many configurable options for policy.
DriveLock from CenterTools provides a full set of endpoint security features.
ESET Endpoint Security provides a full range of endpoint protection features.
FortiClient from Fortinet is an endpoint security client designed to be deployed alongside of a FortiGate appliance.
Included with the suite are the tools necessary to deeply scan systems across the network and via cloud storage, and to find all sensitive data ...
With this software deployed, virtually all malware can seamlessly be detected, contained and prevented without any need for user interaction.
Kaspersky Endpoint Security for Business provides a full suite of endpoint security features in one easy-to-manage application.
This offering manages, assesses and controls security at the endpoint through a single agent and server architecture.
This solution unifies the functions of IT operations and security through a single console, server and agent architecture to seamlessly and more effectively address IT ...
This tool provides dynamic, user-aware policies for encryption, personal firewall, device/port controls, wireless control settings, application controls, and more.
This is a security software solution that helps to prevent data leakage.
Safetica manages and controls data security at the endpoint through its client-server architecture and three major components.
This product suite provides a good set of endpoint protection tools.
Symantec Endpoint Protection is a client-server solution that protects laptops, desktops, Windows, Macs and servers.
VIPRE combines a small-footprint anti-virus agent with integrated patch management and mobile device management, while VIPRE Business Premium helps enterprises manage and control endpoint security ...
This cloud-based endpoint security platform offers advanced anti-malware technology that protects an organization’s endpoint devices from malware, secures and controls applications being used by end-users, ...
This product secures the endpoints both on and off the network with anti-malware, malicious websites blocking and host intrusion protection.
Avalanche from LANDesk/Wavelink allows administrators to remotely manage a number of endpoint devices, including those from Apple, Android and Windows Mobile, as well as wireless ...
Co3 Systems is a cloud-based service that takes everything one needs to know about their organization, meshes it with an extensive knowledge base, procedure and ...
Managing privacy is moving toward collaboration, communication and education, says Ernst & Young's Sagi Leizerov.
Sign up to our newsletters
SC Magazine Articles
- Study: Open Source Software use increasing in enterprises but without vulnerability monitoring
- RSA Conference 2015: Prepare for the IoT before it's too late, Sorebo warns
- 'Aaron's Law' returns to Congress
- RSA 2015: Tension continues to grow between govt, cryptographers
- CozyDuke APT group believed to have targeted White House and State Department
- Study: Conficker declared top threat of 2014, but N. America targeted mainly by AnglerEK
- RSA 2015: Straight talk about encryption, bulk surveillance and IoT
- RSA 2015: In the healthcare industry, security must innovate with business
- RSA 2015: Unintended use of aircraft systems next challenge for counterterrorism community
- RSA 2015: Bug hunting and responsible vulnerability disclosure