November 2008 19 11 Issue of SCMagazine
There are IT security fundamentals that just can't be underestimated, says Illena Armstrong.
Threat of the month
2 minutes on
For the first time in the United States, a law specifies that encryption be used for the transmission of any electronic data.
The introduction disclosure obligations is having an impact on the adoption of encryption across the enterprise, says Richard Moulds, Thales Group.
Identify all data that has value to your business, says Monte Robertson, Software Security Solutions.
Rob Tourt, chair of the PCI Security Standards Council, outlines developments on PCI DSS requirements.
The SC Magazine/CompTIA CEO survey shows stakeholders are trying to get a handle on risk management, reports Illena Armstrong.
The latest craze in cloud computing shows great promise, but it is introducing a host of new security issues, reports Deb Radcliff.
Operators of the nation's critical infrastructure can no longer afford to be complacent, and NERC is making sure of this, reports Dan Kaplan.
A keynote speaker at the upcoming SC World Congress, Karen Evans, OMB, discusses the latest federal initiatives in cybersecurity.
We have been discussing products that help manage access to data over some of our past Group Tests and this month we're back at it. ...
Send your comments, praise or criticisms to scfeedbackUS@haymarketmedia.com. We reserve the right to edit letters.
The GTB Inspector is an appliance which, while heavy, provides numerous features.
Two hundred and seventy-eight pages. That’s the length of the Identity Finder Enterprise Edition documentation. It is easy to see that this needs to be ...
Like many products in this group review, the CWAT (Cybercrime, Warning, Alert, Termination) product takes a modular approach to data leakage prevention. CWAT consists of ...
NextLabs DLP is an interesting software-based offering. While most data leakage prevention products use a primary server to stem the tide of sensitive information from ...
The Symantec offering is the most complex product in this Group Test review.
Trend Micro LeakProof is an all-in-one appliance that comes with everything preloaded. All the admin needs to do is configure the device.
The AdventNet Manage-Engine Password Manager Pro provides a complete system for password management in one simple web-based package. This product includes features which allow for ...
The Cyber-Ark Enterprise Password Vault, or EPV, is a high-end password management powerhouse. This product helps administrators manage privileged account passwords across several major platforms ...
The Hitachi ID-Archive sets its focus on password randomization. With this product, administrators can set up password randomization for sensitive and privileged accounts on workstations ...
The Lieberman Software Enterprise Random Password Manager is a full-on password manager and randomizer for local and domain accounts throughout the enterprise. With little effort ...
Proginet SecurForce is a little bit of a horse of a different color for this month’s Group Test. It focuses more on managing passwords from ...
On the surface, RoboForm Enterprise starts out looking like a single sign-on product, but that is just on the surface. This product allows administrators to ...
The Symark PowerKeeper is a hardened appliance. It comes with a sealed operating system that provides a secure privileged account access management process to replace ...
The Thycotic Secret Server integrates into the exiting environment to manage and control access to critical privileged passwords using a central web-based repository. With this ...
The Symark PowerBroker is a policy-driven, privileged access control application that provides granular account access delegation, detailed logging and reporting, and centralized administration across heterogeneous ...
Most NAC products require enough administration that managing transient users often is more trouble than it’s worth.
It is time for us as a community to look for alternative solutions to data protection, says Chenxi Wang.
Sign up to our newsletters
SC Magazine Articles
- State breakdowns: Anthem breach by the numbers
- Malware on Lime Crime website, payment cards compromised
- Florida law enforcement docs show widespread stingray use, secrecy
- After Superfish-Lenovo incident, Facebook probes larger issue of SSL-sniffing adware
- Botnet of Joomla servers furthers DDoS-for-hire scheme
- State breakdowns: Anthem breach by the numbers
- Carbanak APT campaign made off with $1B from banks globally
- BMW issues security patch for bug allowing attackers physical access into vehicles
- NIST requests final comments on ICS security guide
- Disconnect yawns between CISOs, exec leadership, study says
- Natural Grocers investigating unauthorized access to POS systems
- Proposed Consumer Privacy Bill of Rights Act doesn't go far enough, critics say
- Data at risk for about 50,000 current and former Uber drivers
- North Carolina credit union notification says laptop containing data missing
- Skills in demand: Application security engineers