March 2011 Issue of SCMagazine

March 2011 Issue of SCMagazine

0311 cover image

Editorial

Are things getting brighter...or not?

Executives are poised to accept the additional expenses required to deploy evolved security solutions as they experience cost savings and increased productivity by relying on ...

Update

ESET hires a new CEO, CloudPassage launches, plus other company news.

A roundup of company hires, partnerships and acquisitions in February.

2 minutes on

Requiring ISPs to retain user logs

Privacy advocates appear to be on the losing end of an initiative from the Department of Justice mandating the retention of user data by internet ...

Skills in Demand

Skills in demand: Identity and access management

Every consulting firm that we are working with is requesting pros with identity and access management skills, says Joyce Brocaglia, CEO of Alta Associates.

Me and my job

Me and my job: Fares Alraie of Royal Bank of Canada

Development teams often ignore application security requirements in order to meet all their hard-pressed deadlines and requirements, says Fares Alraie software security specialist at the ...

Debate

Debate: A governance body should be created to administer security certifications

Two sides weigh in on whether the federal government should become involved in the distribution of certifications for security professionals.

Opinion

The cloud's dirty secret

Enterprise security teams need to get involved early in the decision-making process in cloud initiatives.

Take mobile defense seriously

There is no doubt that data security and privacy concerns have almost completely migrated to the mobile channel.

CSO's desk

Post-WikiLeaks: Back to basics

Dust off your company's risk assessment process and make sure it is up to date because this is where your approach to defending against a ...

Features

SC Magazine's CSO of the Year

SC Magazine has recognized Scott Sysol of CUNA Mutual Group as CSO of the Year for his work around data privacy, risk reduction, enterprise-wide IT ...

Embedded in danger: Web-enabled devices

Name a device and, chances are, it soon will have the capability to connect to the internet, if it does not already. Yet, with this ...

Feeding frenzy: M&A activity in IT security

Ravenous merger-and-acquisition activity is telling of a desire by organizations to consolidate their security and operational tasks, especially as threats increase.

Last Word

Before tech, process and policy

Data leakage prevention (DLP) is garnering a lot of attention as a cure-all for risk management.

Product opener

The face of things to come

This month, we get a chance to take a peek into the future, as well as viewing the current state of information assurance (IA) practice.

Group Test 1

Mykonos Software Mykonos Security Appliance

This tool detects attacks, tags and profiles attackers, and responds automatically.

Mobile Enterprise Compliance and Security (MECS) Server v1.1 by Mobile Active Defense

Mobile Enterprise Compliance and Security (MECS) Server v1.1 is a device, virtual device or SaaS offering that controls access to applications for smartphones.

Hatha Systems Knowledge Refinery

The core mission of Hatha Systems’ Knowledge Refinery is to extract an impact analysis from the source code that can tell the analyst what the ...

Silver Tail Systems Mitigation

Silver Tail Systems has taken on the fraud community with a suite of three products.

Global Velocity

The Global Velocity GV-2010 creates content management policies, takes actions when a policy is violated, manages applications and content, sees clear text and encrypted data ...

Kormox [product TBA 4Q 2011]

This tool could have prevented the WikiLeaks scandal.

Invincea Browser Protection

Invincea Browser Protection is an early – and very creative – use of virtualization to protect endpoints from malware.

SentryCom MACS VoiceProof

MACS provides a secure mechanism for authenticating and transferring data to specified secure applications.

Group Test 2

Astaro Security Gateway 220

The Astaro Security Gateway includes several features, including URL filtering, gateway-based spyware and virus protection, application protocol blocking, such as IM and P2P, and HTTPS ...

Cyclope Internet Filtering Proxy

An application that can be installed to a server within the environment to turn it into a web filter.

EdgeWave iPrism Web Security

Boasts a solid feature set, including categorized web and application databases, a botnet database, dynamic anti-virus engine and dynamic application protocol classification.

iBoss Enterprise Filter

Includes a massive array of protection from web-based threats, as well as control over applications and web browsing.

M86 Web Filter

A highly configurable web filter and reporting engine designed for even the largest of environments.

Optenet WebSecure

Offers a multitude of deployment modes for the enterprise, including proxy, bridge, sniffer, ICAP and gateway or router deployment.

SonicWALL NSA 4500

This appliance features highly configurable policy controls and a ton of features.

Sophos Web Appliance

Features a solid URL and reputation filter that uses more than 50 different categories to scan web pages, as well as real-time malware scanning to ...

WebTitan Web Filtering Solution

A comprehensive web management appliance.

Trend Micro InterScan Web Security Virtual Appliance

This appliance handles security risks, such as malware, viruses and spyware, while allowing administrators to construct granular web policy that is transparent to the user.

Advertisement

How to Prevent Insider Threats!

POLL