0311 cover image
Executives are poised to accept the additional expenses required to deploy evolved security solutions as they experience cost savings and increased productivity by relying on ...
A summary of what made news in February.
A roundup of company hires, partnerships and acquisitions in February.
Privacy advocates appear to be on the losing end of an initiative from the Department of Justice mandating the retention of user data by internet ...
Every consulting firm that we are working with is requesting pros with identity and access management skills, says Joyce Brocaglia, CEO of Alta Associates.
Development teams often ignore application security requirements in order to meet all their hard-pressed deadlines and requirements, says Fares Alraie software security specialist at the ...
Two sides weigh in on whether the federal government should become involved in the distribution of certifications for security professionals.
Enterprise security teams need to get involved early in the decision-making process in cloud initiatives.
There is no doubt that data security and privacy concerns have almost completely migrated to the mobile channel.
Dust off your company's risk assessment process and make sure it is up to date because this is where your approach to defending against a ...
SC Magazine has recognized Scott Sysol of CUNA Mutual Group as CSO of the Year for his work around data privacy, risk reduction, enterprise-wide IT ...
Name a device and, chances are, it soon will have the capability to connect to the internet, if it does not already. Yet, with this ...
Ravenous merger-and-acquisition activity is telling of a desire by organizations to consolidate their security and operational tasks, especially as threats increase.
Data leakage prevention (DLP) is garnering a lot of attention as a cure-all for risk management.
This month, we get a chance to take a peek into the future, as well as viewing the current state of information assurance (IA) practice.
This tool detects attacks, tags and profiles attackers, and responds automatically.
Mobile Enterprise Compliance and Security (MECS) Server v1.1 is a device, virtual device or SaaS offering that controls access to applications for smartphones.
The core mission of Hatha Systems’ Knowledge Refinery is to extract an impact analysis from the source code that can tell the analyst what the ...
Silver Tail Systems has taken on the fraud community with a suite of three products.
The Global Velocity GV-2010 creates content management policies, takes actions when a policy is violated, manages applications and content, sees clear text and encrypted data ...
Invincea Browser Protection is an early – and very creative – use of virtualization to protect endpoints from malware.
MACS provides a secure mechanism for authenticating and transferring data to specified secure applications.
The Astaro Security Gateway includes several features, including URL filtering, gateway-based spyware and virus protection, application protocol blocking, such as IM and P2P, and HTTPS ...
An application that can be installed to a server within the environment to turn it into a web filter.
Boasts a solid feature set, including categorized web and application databases, a botnet database, dynamic anti-virus engine and dynamic application protocol classification.
Includes a massive array of protection from web-based threats, as well as control over applications and web browsing.
A highly configurable web filter and reporting engine designed for even the largest of environments.
Offers a multitude of deployment modes for the enterprise, including proxy, bridge, sniffer, ICAP and gateway or router deployment.
This appliance features highly configurable policy controls and a ton of features.
Features a solid URL and reputation filter that uses more than 50 different categories to scan web pages, as well as real-time malware scanning to ...
This appliance handles security risks, such as malware, viruses and spyware, while allowing administrators to construct granular web policy that is transparent to the user.