This month we take a look at the health care markets progress in protecting critical data. Its our first such special section devoted to a ...
Here are the latest corporate happenings in the IT security industry:
Is security information management crucial in making sense of event data?
Attack targetsPayPal, Barclays Bank and eBay were the three firms most targeted by phishers last month, according to statistics compiled by PhishTank users. More than ...
Now that security pros are comfortable with Microsoft's monthly patching cycle, so too are the malware writers. The bad guys have learned that by putting ...
Bob Wilcox, CISO at FiServ, talks about his job - and his likes and gripes.
Like thousands of practitioners in our field, I refer to myself as an information security professional. But what does this really mean in terms of ...
Once again functionality has trumped security. Rapid deployment and development of Web 2.0 has left security as an afterthought. While that might sound somewhat gloomy, ...
A question recently came up that left me wondering about organizational authority to accept risk or, more specifically, enterprise security risks. One of the less ...
SC Magazine is always happy to hear from readers. Send comments, praise or criticisms to scfeedbackus@haymarketmedia.com.
Once upon a time, an employer asked me to sort through the office of a departing technical director for anything the security team wanted to ...
This was an interesting month in the SC Lab.We looked at two different types of products: web content filtering and identity management. The results were ...
Picture this: A doctor is in a life-and-death struggle to save a dying patient and quickly must check medical records to determine if the patient ...
Each year hundreds of millions of dollars are spent on technology to ward off hackers, viruses, worms, trojan horses and other "barbarians at the gate." ...
Ten years after its ratification, there's little doubt that the Health Information Portability and Accountability Act (HIPAA) has provided a strong framework for protecting patients' ...
HIPAA was introduced 10 years ago. In this special section, we look at the effects of the controversial legislation has had on the IT security ...
The new Speaker of the House Nancy Pelosi represents a district not far from Silicon Valley. Freshly minted Chairman of the House Financial Services Committee ...
Good luck using the internet these days at Royal Food Service, an Atlanta-based wholesale produce distribution company. Only the company's high-level executives have access to ...
When the University of California, Los Angeles (UCLA) recently announced that hackers had compromised a database of more than 800,000 people associated with the university, ...
The Evidian product suite was one of the most complete identity management suites that we tested. As with most complete identity management products that cover ...
Citrix Password Manager is intended to manage all aspects of password use in a medium- to large-sized enterprise. The program operates through an ASP SSL ...
This product was one of the two best we reviewed. It is solid, easy to use, well documented and well supported. The Barracuda Web Filter ...
Websense is a venerable player in the web content filtering arena and this year’s entry was no exception to its record of solid products. The ...
MIMEsweeper has been around for a long time. The appliance has a moderate level of features, and is available in four configurations up to a ...
The R3000 is a superb product. The appliance was easy to set up, performed well, is well documented and is feature rich. Set-up is typical ...
Aladdin’s eSafe content filter is delivered as software that requires its own dedicated server. It has a comprehensive suite of features including web filtering, anti-virus ...
The St Bernard iPrism is an appliance that provides a reasonably wide range of web content filtering related features. Using access control lists (ACLs), iPrism ...
M-Tech ID Synch and P Synch are two companion programs that are available to perform identity management. The ID Synch package performs most of the ...
Echo Suite is a software package that installs as client-server architecture. It has the additional ability to install in a peer-to-peer or server-centric environment as ...
Cymphonix describes the function of its Network Composer 7 as "internet data stream control technology". In this regard, the product looks at whatever passes through ...
Secure Computing Webwasher 6.0 is a strong product in almost every regard. We especially liked its ability to perform individual analysis on words, phrases and ...
The Cyber-Ark Password Vault software is another example of implementing a subset of identity management features with a focus on simplicity. This program is designed ...
SurfControl is, arguably, the granddaddy of the web content filtering class. Supplied as software, this product requires its own server platform running Microsoft Windows Server ...
AEP Networks’ SmartGate was the most unique solution we tested. This product is a secure authentication proxy that runs at the application level of the ...
The idEngines Ignition product provides middleware for 802.1x authentication. The product creates an environment where wireless access points, switches and firewalls can authenticate to the ...
The Imprivata OneSign product implements the single sign-on, reporting and user password synchronization components of identity management. Like other products in the identity management space, ...