SC Magazine - January 2008
It seems information security is getting to the front line of business imperatives. More than ever before, executives are giving IT security and data protection ...
Warnings about the dire consequences of cyber-espionage and its affect on the national security of the United States and the business activities of American companies ...
Another year and another set of new resolutions. But can we plan cybersecurity strategically? Some colleagues say no. They insist events are moving too fast.
Several bills are expected to be introduced in Congress soon that would have significant impact on how businesses are required to protect confidential information, as ...
While estimates vary on the volume of phishing emails sent around the world everyday, there is no debating the fact that they have become a ...
Send your comments, praise or criticisms to scfeedbackUS@haymarketmedia.com. We reserve the right to edit letters.
Bruce Bonsall, CISO, MassMutual, says many businesses today are leveraging security as a market differentiator, reports Dan Kaplan.
How secure are the web browsers we rely on? Jim Carr looks at the issues surrounding this essential, but often vulnerable application.
A distinguished panel of judges, as well as you, our readers, have selected the finalists for the 2008 SC Magazine Awards.
Information security pros are increasingly confronted by cybercriminals trawling their corporate networks for customers' private data. More than 80 percent of the respondants to the ...
Welcome to the first Group Test reviews of 2008. Appropriately, we start this year with two important groups: identity management and multifactor authentication products
FISMA lays a good foundation for securing info assets, says Christopher Fountain.
Defender 5 deploys strong two-factor authentication controlled within Windows Active Directory to ensure that only authenticated users have access to protected resources. The Defender 5 ...
Aladdin eToken offers full enterprise-wide deployment and lifecycle management of all authentication tokens, users and support applications. The product uses an open standards-based architecture with ...
Digipass encompasses some of the best features we found into one strong two-factor authentication product. Features start with intuitive policy-based user authentication.
The 4TRESS AAA Server offers scalable authentication and authorization and accounting services. 4TRESS is supported by Lightweight Directory Access Protocol (LDAP) and SQL databases, allowing ...
Encentuate IAM suite has many well-developed features that cover the full spectrum of administrator deployment and end-user authentication.
StrikeForce’s ProtectID product provides an open architecture platform for strong user authentication. The product allows multiple authentication devices, such as biometrics and cell phone authentication ...
The TriCipher Armored Credential System (TACS) is just that: a truly integrated system that delivers authentication with the strength of public key infrastructure (PKI) that ...
Straight out of the gate, this product, coupled with Cisco Adaptive Security Appliance (ASA) SSL VPN, can offer same-day deployment with x.509-level user authentication
This is a lot more than a simple identity management product. Identity Manager is a complete identity management system, a workflow system that simplifies both ...
The IDsentrie identity management appliance brings together several forms of secure user management into one device. This appliance focuses on two main areas of identity ...
This product offers a somewhat different approach to identity management. Its focus is not on user provisioning and the user lifecycle, rather it is a ...
When Avatier claims this to be an Identity Management Suite, they are not kidding around. This product contains all the tools necessary to manage users ...
This product is designed to be the password management piece of a much larger identity management puzzle. Therefore, the features focus only on password management.
The Courion Enterprise Provisioning Suite can be summed up as fully adaptable, tailor-made identity management. Users can select specific components of the suite and have ...
WiseGuard is one piece of the much larger Evidian Identity and Access Management (IAM) Suite. This product focuses only on single sign-on integration into an ...
This product is a few products in one. The Ignition Server serves two functions: identity management and network access control. The Ignition Guest Manager allows ...
Convergence is the best word to sum up this appliance-based product. The Imprivata OneSign appliance brings together three pieces of identity management. The first piece ...
The M-Tech Identity Management Suite is made up of several different modules. The two main modules are ID-Synch and P-Synch.
The Sun Identity Manager is designed to play at a high level in a large environment. This product focuses on creating and managing provisioning workflows ...