July 2010 Issue of SCMagazine

July 2010 Issue of SCMagazine

July 2010

Editorial

Changes to celebrate the industry

The SC Magazine Awards have been going strong for years now.

Threat of the month

2 minutes on

Upgrading to XP SP3 and beyond

The death of Windows XP Service Pack (SP) 2 is set for this month, but many IT administrators appear to be in denial.

Skills in Demand

Me and my job

Opinion

Yet another data mandate

Cyberthreats are driven by the big money behind organized cybercrime, but increased automation is being driven by the American Recovery and Reinvestment Act of 2009 ...

Safety net or false security?

We're not doing enough to proactively defend our networks.

CSO's desk

Breaking compliance down

I am still amazed by the number of organizations that still don't have all of the right people working toward a singular goal of compliance ...

Features

New frontiers

What legal matters must you bear in mind when a cybercrime strikes your company? Larry Jaffe reports.

Cybercrime today

State-sponsored cybercrime is a touchy subject for law enforcement because of the political complications that can result, reports Matthew Heller.

The legal side of cybercrime

As cybercrime continues to intensify and regulatory compliance mandates continue showing signs of becoming even more demanding for organizations, we take a look at the ...

Anti-hack: Retaliatory action against digital attacks

Has the time come to take retaliatory action against digital attacks? And if so, where is the line drawn? Deb Radcliff reports.

Software/hardware assurance: Supply subversion

One weak link in the global supply chain could result in malware being installed on a widely deployed product, reports Angela Moscaritolo.

Virtual reality: Adoption of virtualization

Adoption of virtualization is continuing - with caveats, says Guy Buzzelli, CIO of Delray Beach, Fla. Dan Kaplan reports.

Last Word

Embracing the social network

Social networks must be adopted in the enterprise...with precautions, says Rick Tracy.

Group Test 1

Astaro Security Gateway

The Astaro Security Gateway provides a comprehensive set of protection features.

Check Point UTM-1 136

The Check Point UTM-1 comes fully loaded with firewall, intrusion prevention, anti-virus, anti-spyware, URL filtering, web security and anti-spam.

Cyberoam 50ia

The Cyberoam 50ia appliance is more than a usual UTM.

Fortinet FortiGate-200B-POE

Combines multiple security components, including intrusion prevision system, stateful-inspection firewall, anti-malware, anti-virus, anti-spam, web filtering, IPsec, SSL VPN, WAN optimization and SSL inspection.

GateProtect GPZ 2500

The GateProtect GPZ 2500 is a highly flexible, highly configurable full-function UTM appliance.

NETASQ U120

The U120 from NETASQ includes a firewall, HTTP proxy with URL filtering, and an anti-spam engine.

Netgear ProSecure UTM25

This UTM product combines a stateful packet inspection firewall, IPS, SSL VPN, IPsec VPN, anti-malware, anti-spam and web URL filtering, as well as controls to ...

Panda GateDefender Integra

The Panda GateDefender Integra is comprised of a firewall, an IPS, a VPN, a signature- and heuristic-based anti-malware engine, a content and web filter, and ...

SonicWALL E-Class Network Security Appliance (NSA) E7500

The SonicWALL E-Class Network Security Appliance is a high performance, highly configurable, super UTM.

Vasco aXsGUARD Gatekeeper

The aXsGUARD from Vasco takes the traditional UTM focus and adds strong authentication capabilities for improved security.

ZyXEL Communications USG1000

The ZyXEL USG 1000 provides basic UTM functions – such as a firewall, intrusion detection and prevention engine, anti-virus, web content filter and anti-spam – ...

Group Test 2

McAfee Total Protection for Endpoint v4.5

McAfee Total Protection for Endpoint is a host-based endpoint solution that protects laptops, desktops and server machines from various security threats.

Panda Security for Business v4.05

Panda Security for Business is a software-based solution which offers endpoint security protection for desktops and servers.

Sophos Endpoint Security and Data Protection v9

Sophos Endpoint Security and Data Protection is a software solution designed to protect endpoints from various host- and network-based threats, as well as data leakage ...

Symantec Endpoint Protection v11

Symantec Endpoint Protection combines many Symantec protection technologies into a single, agent-based suite for desktops, servers and mobile devices.

Trend Micro Enterprise Security for Endpoints v10

Enterprise Security for Endpoints is software solution comprised of Trend Micro’s OfficeScan suite of modules, as well as a series of plug-ins, which customers can ...

SkyRecon Systems Storm Shield v5.5

StormShield is an endpoint security software solution consisting of a backend management server and client agents.

First Look

Closing the loop on threats

A fully automated workflow system that performs exactly the way a person would in a manual vulnerability remediation process.

Sign up for our newsletters

POLL