February 2007 Issue of SCMagazine

February 2007 Issue of SCMagazine

Editorial

Is your provider following the rules?

This month we take a look at the health care markets progress in protecting critical data. Its our first such special section devoted to a ...

Update

Company news

Here are the latest corporate happenings in the IT security industry:

Debate

Is security information management crucial in making sense of event data?

News briefs

Attack targetsPayPal, Barclays Bank and eBay were the three firms most targeted by phishers last month, according to statistics compiled by PhishTank users. More than ...

2 minutes on

2 minutes on...Hackers hit Patch Tuesday

Now that security pros are comfortable with Microsoft's monthly patching cycle, so too are the malware writers. The bad guys have learned that by putting ...

Me and my job

Me and my job

Bob Wilcox, CISO at FiServ, talks about his job - and his likes and gripes.

Opinion

In an age of professionalism

Like thousands of practitioners in our field, I refer to myself as an information security professional. But what does this really mean in terms of ...

A look at Web 2.0 security

Once again functionality has trumped security. Rapid deployment and development of Web 2.0 has left security as an afterthought. While that might sound somewhat gloomy, ...

CSO's desk

Who has authority to accept risk?

A question recently came up that left me wondering about organizational authority to accept risk or, more specifically, enterprise security risks. One of the less ...

Letters

Got something to say?

SC Magazine is always happy to hear from readers. Send comments, praise or criticisms to scfeedbackus@haymarketmedia.com.

Features

Be prepared when the court calls

Once upon a time, an employer asked me to sort through the office of a departing technical director for anything the security team wanted to ...

Web content filtering, identity management products trend toward maturity

This was an interesting month in the SC Lab.We looked at two different types of products: web content filtering and identity management. The results were ...

Health care: Duke University Health System's new identity management solution helps doctors and patients

Picture this: A doctor is in a life-and-death struggle to save a dying patient and quickly must check medical records to determine if the patient ...

Health care: Providers fight internal threats with an eye on HIPAA

Each year hundreds of millions of dollars are spent on technology to ward off hackers, viruses, worms, trojan horses and other "barbarians at the gate." ...

Health care: Where are the penalties for failing to comply with HIPAA?

Ten years after its ratification, there's little doubt that the Health Information Portability and Accountability Act (HIPAA) has provided a strong framework for protecting patients' ...

Special report: IT security and health care

HIPAA was introduced 10 years ago. In this special section, we look at the effects of the controversial legislation has had on the IT security ...

What does a new Democratic Congress mean for information security?

The new Speaker of the House Nancy Pelosi represents a district not far from Silicon Valley. Freshly minted Chairman of the House Financial Services Committee ...

IT pros, developers and end users must ally to fend off emerging Web 2.0 threats

Good luck using the internet these days at Royal Food Service, an Atlanta-based wholesale produce distribution company. Only the company's high-level executives have access to ...

Organizations turn to new techniques to fight financially motivated attacks

When the University of California, Los Angeles (UCLA) recently announced that hackers had compromised a database of more than 800,000 people associated with the university, ...

Product Reviews

Evidian SSO Express Standard Edition

The Evidian product suite was one of the most complete identity management suites that we tested. As with most complete identity management products that cover ...

Citrix Password Manager

Citrix Password Manager is intended to manage all aspects of password use in a medium- to large-sized enterprise. The program operates through an ASP SSL ...

Barracuda Web Filter

This product was one of the two best we reviewed. It is solid, easy to use, well documented and well supported. The Barracuda Web Filter ...

Websense Web Security Suite 6.3

Websense is a venerable player in the web content filtering arena and this year’s entry was no exception to its record of solid products. The ...

Clearswift MIMEsweeper

MIMEsweeper has been around for a long time. The appliance has a moderate level of features, and is available in four configurations up to a ...

8e6 Technologies R3000

The R3000 is a superb product. The appliance was easy to set up, performed well, is well documented and is feature rich. Set-up is typical ...

Aladdin eSafe Web 5.2

Aladdin’s eSafe content filter is delivered as software that requires its own dedicated server. It has a comprehensive suite of features including web filtering, anti-virus ...

St. Bernard iPrism M3100

The St Bernard iPrism is an appliance that provides a reasonably wide range of web content filtering related features. Using access control lists (ACLs), iPrism ...

M-Tech ID Synch and P Synch

M-Tech ID Synch and P Synch are two companion programs that are available to perform identity management. The ID Synch package performs most of the ...

Pearl Echo Suite v. 7.0

Echo Suite is a software package that installs as client-server architecture. It has the additional ability to install in a peer-to-peer or server-centric environment as ...

Cymphonix Network Composer 7

Cymphonix describes the function of its Network Composer 7 as "internet data stream control technology". In this regard, the product looks at whatever passes through ...

Secure Computing Webwasher 6.0

Secure Computing Webwasher 6.0 is a strong product in almost every regard. We especially liked its ability to perform individual analysis on words, phrases and ...

Cyber-Ark Password Vault

The Cyber-Ark Password Vault software is another example of implementing a subset of identity management features with a focus on simplicity. This program is designed ...

SurfControl Web Filter 5.5

SurfControl is, arguably, the granddaddy of the web content filtering class. Supplied as software, this product requires its own server platform running Microsoft Windows Server ...

AEP Networks SmartGate

AEP Networks’ SmartGate was the most unique solution we tested. This product is a secure authentication proxy that runs at the application level of the ...

idEngines Ignition

The idEngines Ignition product provides middleware for 802.1x authentication. The product creates an environment where wireless access points, switches and firewalls can authenticate to the ...

Imprivata OneSign

The Imprivata OneSign product implements the single sign-on, reporting and user password synchronization components of identity management. Like other products in the identity management space, ...

Amenaza Technologies Ltd. SecurITree

Amenaza SecurITree has a different view of risk analysis.

Sign up for our newsletters

POLL