October 2007 18 10 Issue of SCMagazine
SC Magazine - October 2007
The Infosecurity event in NY this year again was coupled with a large physical security show. But the question is: Why?
The latest happenings in IT security's boardrooms.
Is monitoring internet usage a company's responsibility?
The latest IT security news.
Server-side polymorphic malware is unique permutations of similar malicious code launched via multiple infection sources in quick succession. It has become the most popular email-borne ...
2 minutes on
It seems as if we see a new form of online criminal activity just about every day. If it isn’t a bank’s website being taken ...
Me and my job
Brian Bernard tells SC Magazine about his job.
Back on July 30, the Wall Street Journal published an article entitled, “Ten Things Your IT Department Won’t Tell You.” From getting around web filters ...
(CISO). Some companies are further empowering this somewhat new role with expansive powers and responsibilities that range from incident response to IT compliance to customer ...
We are becoming quite adept at dealing with technology threats and vulnerabilities. We spend a lot of time, effort and money on software, hardware and ...
Access control is the order of the day for this issue. All of our reviews focus on aspects of access control and management. This, of ...
Nominations are now open for the 2008 SC Magazine Awards, so cast your ballot in any of 20 Reader Trust categories.
The $400 million World Wrestling Entertainment empire is out to body slam internet swindlers, reports Dan Kaplan.
While pirated software is common in many countries, steps are being taken to halt the practice, reports Frank Washkuch Jr.
Organizations must catch on to the growing risks of smartphones, PDAs and other mobile devices before it is too late, reports Dan Kaplan.
Preston Wood is one CISO on top of the integration of enterprise security and networking operations, says Jim Carr.
Multiple authentication credential management.
Out-of-band NAC uses existing network architecture.
A feature rich performer, but you'll need to spend some time getting up to speed on it and the support is a bit light. Very ...
For simple workstation authentication using most available fingerprint scanners this is an interesting, though limited product.
An interesting product that adds strong authentication to places where strong authentication is not normally offered. Can replace more costly, less secure methods.
Easy to install, but enrolling users can be a challenge.
For its ease of use and powerful feature set, we make this our Recommended product.
For physical access control this is a very strong product.
This interesting product features access control based on facial recognition rather than fingerprints. The camera itself is capable of providing not only the 3-D image ...
This is an excellent product., well priced and full of features. We award this our Best Buy.
If you are adding biometric capability to custom applications, this is for you. It will simplify your task significantly.
A perfect SSL VPN product for small- and medium-sized businesses.
A good product, which is above average on the whole.
Easy to use, well put together, free support and superior documentation make this offering our Best Buy.
A product with some interesting features, but missing a few where it counts the most.
Documentation and ease of use are average, but the rest of the product is superior. This appliance is our Recommended product.
A good product that scales well for many environments.
For an organization familiar with AEP products and willing to learn the interface, the product is a good buy.
The fundamental values of security should be baked into vendor solutions, says Anton Grashion.
Send your comments, praise or criticisms to SCfeedbackUS@haymarketmedia.com. We reserve the right to edit letters.
SC Magazine Articles
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- CEO sacked after aircraft company grounded by whaling attack
- Some U.S. Bancorp workers' W-2 info exposed in ADP data breach
- Microsoft warns of new, self-propagating ransomware in the wild