SC Magazine - October 2007
The Infosecurity event in NY this year again was coupled with a large physical security show. But the question is: Why?
Is monitoring internet usage a company's responsibility?
Server-side polymorphic malware is unique permutations of similar malicious code launched via multiple infection sources in quick succession. It has become the most popular email-borne ...
It seems as if we see a new form of online criminal activity just about every day. If it isn’t a bank’s website being taken ...
Back on July 30, the Wall Street Journal published an article entitled, “Ten Things Your IT Department Won’t Tell You.” From getting around web filters ...
(CISO). Some companies are further empowering this somewhat new role with expansive powers and responsibilities that range from incident response to IT compliance to customer ...
We are becoming quite adept at dealing with technology threats and vulnerabilities. We spend a lot of time, effort and money on software, hardware and ...
Send your comments, praise or criticisms to SCfeedbackUS@haymarketmedia.com. We reserve the right to edit letters.
Access control is the order of the day for this issue. All of our reviews focus on aspects of access control and management. This, of ...
Nominations are now open for the 2008 SC Magazine Awards, so cast your ballot in any of 20 Reader Trust categories.
The $400 million World Wrestling Entertainment empire is out to body slam internet swindlers, reports Dan Kaplan.
While pirated software is common in many countries, steps are being taken to halt the practice, reports Frank Washkuch Jr.
Organizations must catch on to the growing risks of smartphones, PDAs and other mobile devices before it is too late, reports Dan Kaplan.
Preston Wood is one CISO on top of the integration of enterprise security and networking operations, says Jim Carr.
The fundamental values of security should be baked into vendor solutions, says Anton Grashion.
A feature rich performer, but you'll need to spend some time getting up to speed on it and the support is a bit light. Very ...
For simple workstation authentication using most available fingerprint scanners this is an interesting, though limited product.
An interesting product that adds strong authentication to places where strong authentication is not normally offered. Can replace more costly, less secure methods.
For its ease of use and powerful feature set, we make this our Recommended product.
This interesting product features access control based on facial recognition rather than fingerprints. The camera itself is capable of providing not only the 3-D image ...
This is an excellent product., well priced and full of features. We award this our Best Buy.
If you are adding biometric capability to custom applications, this is for you. It will simplify your task significantly.
Easy to use, well put together, free support and superior documentation make this offering our Best Buy.
A product with some interesting features, but missing a few where it counts the most.
Documentation and ease of use are average, but the rest of the product is superior. This appliance is our Recommended product.
For an organization familiar with AEP products and willing to learn the interface, the product is a good buy.
Nov. 2-7
Nov. 5-9
Nov. 14-15
Dec. 2-4
Jan 11-19, 2008
March 25-26