Welcome to our Malware Special, in which our product reviews cover solutions that can help you address one of the granddaddies of internet security threats. ...
Exploit Prevention Labs, a web security firm, has promoted Chris Weltzien to president. He previously served as chief operating officer since the company was founded ...
Is endpoint security a more complete solution for corporations than NAC?
Fed breach lawA federal ID theft task force backed a breach notification law on government use of personal information. The President's Identity Task Force, co-chaired ...
If you felt the floor shake after the feds helped indict the owners of e-gold on money laundering charges, it might be attributable to an ...
How do you explain your job to non-technical people?I'd say that I'm the person where the "buck stops here." My semi-official role is to be ...
Why is it that two restaurateurs can take the same basic ingredients, but create dishes that invoke such opposing reactions from customers: one dish bland ...
A natural way of achieving security is to focus on the business basics: identifying your customers; ensuring that they can do everything they need to ...
Recently, there has been a lot of focus in the financial, security and merchant world on a few high-profile breaches of data security. The TJX ...
SC Magazine is always happy to hear from readers. Send comments, praise or criticisms to scfeedbackus@haymarketmedia.com.
To the perhaps clichéd title of this months column, we can add bots, root kits, spyware and other assorted beasties that now crawl the internet. ...
Once considered a peripheral communication tool used primarily by only some workers, instant messaging (IM) is now feared by many as a security hazard. For ...
Can Google guarantee safe, secure online word processing and spreadsheet collaboration applications to enterprises? While only time will tell, the short answer appears to be ...
Never mind the Fourth of July, New Year's Eve or even his birthday. The occasion George Dolicker celebrated most merrily last year was International Computer ...
Years ago, a friend's e-commerce company took a major hit when customer credit card information was stolen from the company database. Everyone initially assumed it ...
This product has many useful features and protection capabilities. Features include anti-virus scanning for protocols such as SMTP, HTTP, FTP and POP3.
F-Secure Client Security 7 hosts several features that make the battle against harmful malware coming into a network, or already at rest inside, a lot ...
Webroot’s SME Security is a comprehensive malware management tool. This product provides protection against a variety of problems, such as viruses, spyware, trojans, rootkits and ...
Marshal’s WebMarshal product is an all-inclusive web content filter and anti-malware product.
Blink Professional is basically an endpoint security product with some extra protection. This product features anti-virus, anti-spyware and anti-phishing protection.
There are three main features in the Network Edition of this product. First is the anti-virus, which protects the environment from worms, viruses and trojans. ...
The LANDesk Security Suite is a module of a much larger, fully inclusive security management tool for networks. The LANDesk Management Suite drives the boat, ...
This product contains several pieces that integrate very well. When combined, it covers protection from viruses, worms, spyware and other malicious attacks.
BixFix AntiThreat is a module of the powerful BigFix platform. The platform can manage a multitude of areas in the environment, such as policy reinforcement ...
Savant takes a completely different view of the problem of malware. This product looks at changes in an application’s fingerprint that may indicate that the ...
Proventia Desktop focuses on two areas, the first being protection from spyware. This product analyzes network downloads to stop the spread of new spyware, and ...
The Kaspersky Open Space Security suite has many of the features necessary for good network protection. The suite includes protection on both the email and ...
You don't need a 100-headed monster to control sensitive data that needs to be transported from the computer. You just need one Hydra PC. In ...