November 2008 19 11 Issue of SCMagazine
There are IT security fundamentals that just can't be underestimated, says Illena Armstrong.
Threat of the month
2 minutes on
For the first time in the United States, a law specifies that encryption be used for the transmission of any electronic data.
The introduction disclosure obligations is having an impact on the adoption of encryption across the enterprise, says Richard Moulds, Thales Group.
Identify all data that has value to your business, says Monte Robertson, Software Security Solutions.
Rob Tourt, chair of the PCI Security Standards Council, outlines developments on PCI DSS requirements.
The SC Magazine/CompTIA CEO survey shows stakeholders are trying to get a handle on risk management, reports Illena Armstrong.
The latest craze in cloud computing shows great promise, but it is introducing a host of new security issues, reports Deb Radcliff.
Operators of the nation's critical infrastructure can no longer afford to be complacent, and NERC is making sure of this, reports Dan Kaplan.
A keynote speaker at the upcoming SC World Congress, Karen Evans, OMB, discusses the latest federal initiatives in cybersecurity.
It is time for us as a community to look for alternative solutions to data protection, says Chenxi Wang.
We have been discussing products that help manage access to data over some of our past Group Tests and this month we're back at it. ...
Send your comments, praise or criticisms to scfeedbackUS@haymarketmedia.com. We reserve the right to edit letters.
The GTB Inspector is an appliance which, while heavy, provides numerous features.
Two hundred and seventy-eight pages. That’s the length of the Identity Finder Enterprise Edition documentation. It is easy to see that this needs to be ...
Like many products in this group review, the CWAT (Cybercrime, Warning, Alert, Termination) product takes a modular approach to data leakage prevention. CWAT consists of ...
NextLabs DLP is an interesting software-based offering. While most data leakage prevention products use a primary server to stem the tide of sensitive information from ...
The Symantec offering is the most complex product in this Group Test review.
Trend Micro LeakProof is an all-in-one appliance that comes with everything preloaded. All the admin needs to do is configure the device.
The AdventNet Manage-Engine Password Manager Pro provides a complete system for password management in one simple web-based package. This product includes features which allow for ...
The Cyber-Ark Enterprise Password Vault, or EPV, is a high-end password management powerhouse. This product helps administrators manage privileged account passwords across several major platforms ...
The Hitachi ID-Archive sets its focus on password randomization. With this product, administrators can set up password randomization for sensitive and privileged accounts on workstations ...
The Lieberman Software Enterprise Random Password Manager is a full-on password manager and randomizer for local and domain accounts throughout the enterprise. With little effort ...
Proginet SecurForce is a little bit of a horse of a different color for this month’s Group Test. It focuses more on managing passwords from ...
On the surface, RoboForm Enterprise starts out looking like a single sign-on product, but that is just on the surface. This product allows administrators to ...
The Symark PowerKeeper is a hardened appliance. It comes with a sealed operating system that provides a secure privileged account access management process to replace ...
The Thycotic Secret Server integrates into the exiting environment to manage and control access to critical privileged passwords using a central web-based repository. With this ...
The Symark PowerBroker is a policy-driven, privileged access control application that provides granular account access delegation, detailed logging and reporting, and centralized administration across heterogeneous ...
Most NAC products require enough administration that managing transient users often is more trouble than it’s worth.
Sign up to our newsletters
SC Magazine Articles
- Microsoft report explores dangers of running expired security software
- Survey: real-time SIEM solutions help orgs detect attacks within minutes
- Vulnerabilities identified in three Advantech products
- Android malware 'NotCompatible' evolves, spawns resilient botnet
- State Department hack may be tied to White House network breach
- Operators disable firewall features to increase network performance, survey finds
- Waste no time patching Windows Schannel, OLE bugs, experts warn
- Study: 68 percent of healthcare breaches caused by loss or theft of devices, files
- Spin.com redirects to Rig Exploit Kit, infects users with malware, Symantec observes
- Upping the ante: PCI Security Standard
- Study: Third of employees use company devices for social media and online shopping
- 'DoubleDirect' MitM attack affects iOS, Android and OS X users
- Swedish appeals court nixes Assange's plea
- Critical XSS vulnerability addressed in WordPress
- The Internet of Things (IoT) will fail if security has no context