March 2010 Issue of SCMagazine

March 2010 Issue of SCMagazine

March 2010

Editorial

In support of rights to privacy

A balance between basic civil rights and national security must be struck

Threat of the month

Skills in Demand

Me and my job

Opinion

A proactive data regulation

It's critical that professionals who work with client personal information follow specific, proactive steps to ensure they're in compliance.

Phishing for a job?

Résumés are a rich source of personal information that can be used for identity theft, or for spear phishing attacks that target individuals for their ...

CSO's desk

From the CSO's desk: DLP solutions can make your case

Visibility is a critical element to both the physical and cybersecurity universes, says Ron Baklarz, CISO, Amtrak.

Features

CSO of the Year

Mark Weatherford, California's CISO, transformed the government into an enterprise organization, Illena Armstrong reports.

Solid state: A new state data breach regulation

A new privacy regulation in Massachusetts evokes anxiety for many, but getting in line may prove to be no big deal, reports Greg Masters.

Global village

Testing competitions can improve code, but crowdsourcing brings new concerns to security governance, reports Deb Radcliff.

Book of the Night

The winners of the 2010 SC Awards - honoring the best products, services and people in the IT security industry - were announced at our ...

Last Word

Bringing clarity to the cloud

REST has emerged as a core enabling "architecture" for cloud services, says AmberPoint's Andrew Brown.

Product opener

A mish-mash of interesting (and useful) information

Along with profiles of the top 10 companies we selected in our recent competition, there are all sorts of unprecedented things happening in the email ...

Group Test 1

HyTrust

HyTrust sees an opportunity to address an inherent weakness in managing the virtual infrastructure.

Yubico

YubiKey is a simple, inexpensive authentication token that works with open source software to provide strong authentication to networks and applications over the internet.

Envision Security

Puts risk management in the financial context where it belongs.

SMS Passcode A/S

SMS codes often can reach cell phones when a conversation might not be possible.

Silver Tail Systems

Silver Tail Systems has two services, Forensics and Mitigation, that separately address parts of the fraud problem and together offer a solid solution to it.

O1 Communications

This tool breaks up information based on need-to-know.

Callplex

This solution offers about the most secure method available today for storing sensitive files.

Purewire

Purewire’s approach is that web filters control users when the users really need to be protected.

Triumfant

Triumfant performs remediation on the fly and can create pristine machines by taking a known good machine and using it as a donor for the ...

XyberShield

XyberShield combats web application attacks, such as SQL injection or cross-site scripting, by using a form of behavior profiling called XyberFrames.

Group Test 2

Astaro Security Gateway 7.5

A hardware appliance that provides many different security features rolled into one appliance.

Axway MailGate 3.7

A hardware appliance which offers inbound and outbound protection for downstream SMTP architectures.

Fortinet Fortimail 400B

An appliance-based email security solution that helps secure email both at the protocol and content layers for inbound and outbound messaging.

M86 MailMarshal SMTP

A software-based solution that protects inbound and outbound email messages using common threat management and encryption capabilities.

McAfee Email Gateway 6.7

An email security and content management gateway device, which provides inbound and outbound protection against spam, viruses, data leakage and other messaging threats.

PGP Universal Gateway Email

A centrally managed email security software appliance, typically deployed on certified hardware devices.

PineApp Ltd. Mail-SeCure 3000

An email content management appliance that operates in a gateway mode to ensure anti-spam, anti-virus and content filtering protection for most common email architectures.

Proofpoint Messaging Security Gateway 6.0

An appliance based, email security gateway which can be deployed as either a hardware device or as a virtual appliance.

Sendmail Sentrion MP 4.0

An email security and email content management solution that contains several security services.

Sophos Email Security and Data Protection 3.4

A hardware appliance that acts as an email security and content management gateway supporting downstream SMTP architectures.

Trend Micro IMSVA

IMSVA supports anti-spam, anti-virus, gateway encryption and content filtering.

WatchGuard Technologies XCS 770

An appliance-based security and content management filtering solution that is part customer-premise device and part cloud-based services.

Sign up for our newsletters

POLL