July 2009 20 7 Issue of SCMagazine
Preventing access to Web 2.0 sites altogether isn't the right move.
Threat of the month
2 minutes on
President Obama's recent announcement unveiling a protection plan for the nation's digital infrastructure and a new federal cyber coordinator position was met with both praise ...
The areas of security and privacy have grown substantially more complex in recent years, says Deloitte & Touche's Ted DeZabala.
The increased sophistication of internal and external threats requires a culture-driven approach to data security, says Ed Gaudet, Liquid Machines.
True security cultures are created via a transparent process that offers equal parts of praise and punishment, says Experian's Stephen Scharf.
An academic health center based in Houston found assistance in the provisioning of users across its network, reports Greg Masters.
Despite dwindling budgets, some IT departments are finding ways to become more efficient and secure, reports Angela Moscaritolo.
Large and small enterprises are facing a number of issues when it comes to forensic investigations, reports Deb Radcliff.
When a breach occurs, customers expect more than an apology, says Bob Maley, Pennsylvania's CISO. Dan Kaplan reports.
SC World Congress 2009 gathers a first-class speaker roster, Security Innovators Throwdown and a vendor showcase.
Organizations can secure access to applications across domains using federation, says Eric Olden.
We're always happy to hear from you, our readers. Please send your comments, praise or criticisms to scfeedbackUS@haymarketmedia.com. We reserve the right to edit letters.
The Safend Data Protection Suite is an encryption (and endpoint protection) software solution that consists of a centralized management console, which runs on IIS and ...
BeCrypt DISK Protect is a standalone software solution that offers whole disk encryption protection for host machines.
Mobile Guardian Enterprise Edition is a client-server encryption architecture that deploys encryption policies from a centralized management console to various Windows-based clients and mobile devices.
DESlock+ is a software-based product that contains both a central administration server component, as well as a client application to manage encryption in the enterprise.
PGP’s Whole Disk Encryption is a software application that provides multiple encryption options for a host machine.
StormShield Flexible Data Encryption by SkyRecon is a client-server-structured software solution that provides file- and folder-based encryption to host machines.
SafeGuard Enterprise from Sophos is a series of software-based components that comprise an entire modular suite.
WinMagic SecureDoc v4.6 is a software-based solution which provides a centrally managed encryption platform.
Adobe LiveCycle Rights Management ES is a client-server-based digital rights management (DRM) product that integrates with most existing infrastructure, including directory systems, operating systems and ...
SafeNet’s HASP SRM controls access to protected software applications either through a hardware dongle or through a virtual dongle that resides on the end-user’s hard ...
The CI Appliance from Code Green Networks provides scanning of network traffic for sensitive content, and based on policy can block, allow, quarantine, retain a ...
EMC Documentum Information Rights Management (IRM) encrypts and persistently protects documents from unauthorized viewing, copying and printing, regardless of where the document physically resides.
The Fidelis Extrusion Prevention System (XPS) is a full-function, high-end system that can combat data leakage on many fronts.
The GTB Inspector is designed to protect the enterprise from data leakage.
NextLabs Enterprise DLP is an all-around, full-featured data leakage prevention and digital rights management product.
The SecureMetric SecureDongle X provides license protection so that software developers can protect their software against piracy.
The appliance can be accessed through SSH, but only the customized Rohati commands are available, and there are no services turned on that are not ...
Sign up to our newsletters
SC Magazine Articles
- Impact of Linux bug 'grinch' spans servers, workstations, Android devices and more
- House, in rush vote, passes Intelligence Authorization Act
- More than 100K WordPress sites compromised by malware due to plugin vulnerability
- Phishing email contains Word doc, enabling macros leads to malware infection
- U.S. accounts for most Mac OS X attacks and websites seeded with malware
- Neverquest botnet furthers crimeware-as-a-service biz for fraudsters
- Solo attacker likely responsible for phishing campaign, delivering Zeus variant
- Telecommunications companies on the line with FTC, FCC for cramming schemes
- The 10 POS malware families this holiday season
- White House calls Sony hack a "serious national security matter," gov't mulls proper response