January 2009 20 1 Issue of SCMagazine
After the success of our inaugural SC World Congress and Expo in December, we're kicking off 2009 on a high note.
Threat of the month
2 minutes on
Some regard a new state data breach law as a model, others see it as too strict.
Compliance expenses aren't optional, but getting more from your compliance investments is a possibility.
Security teams must be integrally involved from the beginning in a discussion about transforming the enterprise to the cloud model.
Conducting security assessments of critical service providers is an essential part of an enterprise risk management program.
A slumping economy will have a bearing on spend for safeguarding critical data in more ways than expected, reports Illena Armstrong.
With federal law enforcement veteran Kathleen Kiernan leading the way, InfraGard is ready for its coming-out party, reports Dan Kaplan.
Many experts are optimistic that the Obama administration will take positive measures in cybersecurity, reports Angela Moscaritolo.
The winners of the prestigious 2009 SC Awards U.S. will be announced on Tuesday, April 21 in San Francisco.
The SC World Congress brought together IT security thought leaders and solutions from an array of vendors.
We're always happy to hear from you, our readers.
This product integrated most of the malware solutions while providing an efficient, streamlined user-friendly offering.
This product consists of several modules. There is the ERA Server, ERA Console, ERA Mirror server and client computers running ESET AV, Server Edition or ...
The F-Secure Policy Manager was easy to use and installed in about 30 minutes. The Policy Manager was capable of managing our anti-virus and client ...
This solution provides real-time protection with files being scanned when accessed, created or modified. Protection for files, web or email content is included. Protection for ...
The LANDesk Security Suite application contained both the management suite and the client agents, which was nice. The deployment, however, was reliant on multiple server-based ...
Savant Enterprise Management System (SEMS) takes a unique approach to malware protection. The product is geared to stopping the zero-hour threats. It does this by ...
The SonicWALL Email Security solution is a purpose built appliance providing gateway email content filtering and protection from viruses, spyware, trojan horses, worms and other ...
The InterScan Web Security Virtual Appliance (IWSVA) is a gateway solution providing protection for web-based threats via HTTP and FTP. The product is delivered as ...
The Web Site Firewall Model 460 is an application protection firewall, which resides on a single appliance device.
The VPN Firewall Brick is a selective, but major upgrade over the stateful inspection firewall commonly deployed in the late 1990s. It is an appliance ...
The first conference I attended was a Check Point conference in 1996. The company pioneered stateful inspection, and it seemed that a good portion of ...
WebDefend is an application firewall that protects the organization in many ways. It takes a different approach to SSL-based traffic than most other devices.
If you’ve considered SonicWALL before and didn’t take the plunge, now is the time. This offering is an appliance-based tool, which runs on a 1U ...
This appliance-based offering runs on a 1U rack-mounted device. The Secure Firewall provides eight Ethernet interfaces, which can be separately addressed and configured. The tool ...
This completely unique offering from Applicure protects IIS- or Apache-based web servers running on a Microsoft Windows machine. However, while dotDefender has unique characteristics, many ...
The cost and technical benefits of virtualization have created an internal frenzy to move more systems to a virtual environment.
Sign up to our newsletters
SC Magazine Articles
- State breakdowns: Anthem breach by the numbers
- Botnet of Joomla servers furthers DDoS-for-hire scheme
- Report: Majority of health-related websites leak data to third parties
- Researchers investigate link between Axiom spy group, Anthem breach
- Natural Grocers investigating unauthorized access to POS systems
- State breakdowns: Anthem breach by the numbers
- Carbanak APT campaign made off with $1B from banks globally
- NIST requests final comments on ICS security guide
- Disconnect yawns between CISOs, exec leadership, study says
- Microsoft phishing emails target corporate users, deliver malware that evades sandboxes
- Angler EK hijacks domain registrant credentials to create malicious pages
- New SSL/TLS vulnerability, FREAK, puts secure communications at risk
- Tsukuba trojan aimed at Japanese banking customers
- GAO releases report on FAA security lapses, experts remain unconcerned
- Infections caused by prevalent financial trojans dropped 53 percent last year