October 2007 18 10 Issue of SCMagazine
SC Magazine - October 2007
The Infosecurity event in NY this year again was coupled with a large physical security show. But the question is: Why?
The latest happenings in IT security's boardrooms.
Is monitoring internet usage a company's responsibility?
The latest IT security news.
Server-side polymorphic malware is unique permutations of similar malicious code launched via multiple infection sources in quick succession. It has become the most popular email-borne ...
2 minutes on
It seems as if we see a new form of online criminal activity just about every day. If it isn’t a bank’s website being taken ...
Me and my job
Brian Bernard tells SC Magazine about his job.
Back on July 30, the Wall Street Journal published an article entitled, “Ten Things Your IT Department Won’t Tell You.” From getting around web filters ...
(CISO). Some companies are further empowering this somewhat new role with expansive powers and responsibilities that range from incident response to IT compliance to customer ...
We are becoming quite adept at dealing with technology threats and vulnerabilities. We spend a lot of time, effort and money on software, hardware and ...
Access control is the order of the day for this issue. All of our reviews focus on aspects of access control and management. This, of ...
Nominations are now open for the 2008 SC Magazine Awards, so cast your ballot in any of 20 Reader Trust categories.
The $400 million World Wrestling Entertainment empire is out to body slam internet swindlers, reports Dan Kaplan.
While pirated software is common in many countries, steps are being taken to halt the practice, reports Frank Washkuch Jr.
Organizations must catch on to the growing risks of smartphones, PDAs and other mobile devices before it is too late, reports Dan Kaplan.
Preston Wood is one CISO on top of the integration of enterprise security and networking operations, says Jim Carr.
Send your comments, praise or criticisms to SCfeedbackUS@haymarketmedia.com. We reserve the right to edit letters.
Multiple authentication credential management.
Out-of-band NAC uses existing network architecture.
A feature rich performer, but you'll need to spend some time getting up to speed on it and the support is a bit light. Very ...
For simple workstation authentication using most available fingerprint scanners this is an interesting, though limited product.
An interesting product that adds strong authentication to places where strong authentication is not normally offered. Can replace more costly, less secure methods.
Easy to install, but enrolling users can be a challenge.
For its ease of use and powerful feature set, we make this our Recommended product.
For physical access control this is a very strong product.
This interesting product features access control based on facial recognition rather than fingerprints. The camera itself is capable of providing not only the 3-D image ...
This is an excellent product., well priced and full of features. We award this our Best Buy.
If you are adding biometric capability to custom applications, this is for you. It will simplify your task significantly.
A perfect SSL VPN product for small- and medium-sized businesses.
A good product, which is above average on the whole.
Easy to use, well put together, free support and superior documentation make this offering our Best Buy.
A product with some interesting features, but missing a few where it counts the most.
Documentation and ease of use are average, but the rest of the product is superior. This appliance is our Recommended product.
A good product that scales well for many environments.
For an organization familiar with AEP products and willing to learn the interface, the product is a good buy.
The fundamental values of security should be baked into vendor solutions, says Anton Grashion.
Sign up to our newsletters
SC Magazine Articles
- Zero-day in Fiat Chrysler feature allows remote control of vehicles
- 'GSMem' malware designed to infiltrate air-gapped computers, steal data
- All smartwatches are vulnerable to attack, finds study
- Apple App Store and iTunes buyers hit by zero-day
- Hacking Team issues new statement while researcher clears up Android tool confusion
- United reportedly hacked by same group that breached Anthem, OPM
- HAMMERTOSS malware represents culmination of 'best practices' for cyber attackers
- Hundreds of Massachusetts General Hospital patients notified of data incident
- Majority of Android devices vulnerable to denial-of-service bug
- Security concerns raised at Windows 10 roll-out