October 2009 Issue of SCMagazine

October 2009 Issue of SCMagazine

Editorial

Leaving users unscathed after M&A

Information security as an industry sees a profusion of mergers and acquisitions. But one interesting effect from it is the need to re-evaluate the variety ...

Threat of the month

Threat of the month: Clampi/Ligats

Clampi (aka Ligats or Ilomo) is an information theft botnet. The malcode is a multicomponent tool that injects code into running processes, alters the PC's ...

Opinion

Who's in charge of mobility?

The demarcation between worlds is rapidly blurring...

To cloud, or not to cloud...

Companies must consider the risks of moving to the cloud...

CSO's desk

An effective incident response process

Security and privacy incidents pose real risks to companies of any size and complexity.

Letters

Letters

We're always happy to hear from you, our readers. Please send your comments, praise or criticisms to scfeedbackUS@haymarketmedia.com. We reserve the right to edit letters.

Features

An urge to converge: Physical and logical identity and access management

The convergence of physical and logical security continues, but vital steps must still be taken, reports Angela Moscaritolo.

Certifiably trusted: Security assurance

Rob Housman of the Cyber Secure Institute advocates using only the best IT to prevent attacks, reports Dan Kaplan.

Labor pains: Health care security roundtable

As an increasing number of patient medical records go digital, health care security pros face some trying times, reports Illena Armstrong.

Foiling web app attacks

"There's a web app attack for that," might be a suitable ad slogan for cybercriminals these days, reports Chuck Miller.

Last Word

The best way to remediate

We should not require all vulnerabilities to be remediated by patching, says Michael Chernin.

Product Reviews

Avenda Systems eTIPS

The eTIPS appliance provides a solid platform for NAC. With this tool, system administrators can set policies for wired, wireless and VPN network access and ...

Black Box Veri-NAC Appliance

The Black Box Veri-NAC appliance provides agentless detection, alerting and blocking of attacks against a variety of network devices, including managed switches, VoIP phone ports, ...

Enterasys Network Access Control

The Enterasys Network Access Control appliance can be deployed inline or out-of-band, which provides for flexibility based on the network environment.

Bradford Networks NAC Director

The NAC Director from Bradford Networks features a policy-driven architecture to provide agent-based access control across wired, wireless and VPN connections throughout the network.

ForeScout CounterACT

The ForeScout Counter-ACT appliance is an out-of-band, agentless network access control device. It accesses network devices by using service-level authentication credentials to scan against the ...

Sophos NAC Advanced

The NAC Advanced from Sophos is a software-based access control and compliance platform. With this tool, administrators can configure and roll-out policies based on users ...

StillSecure Safe Access

StillSecure Safe Access is a complete NAC appliance that stops unauthorized access, prevents malicious endpoint activity and enforces compliance.

AlgoSec Firewall Analyzer v5.1, plus

The AlgoSec review consisted of two products that are fully integrated and available as standalone offerings.

BigFix Enterprise Suite v7.2

BigFix Enterprise Suite v7.2 provides security configuration and vulnerability management and allows for broad policy enforcement in the enterprise, with real-time visibility and control of ...

Kaseya 6

The Kaseya IT Automation Framework is a suite of offerings that integrate and automate all basic IT tasks, such as systems management, patch management, IT ...

Novell ZENworks v10

ZENworks Configuration Management Enterprise Edition v10 is a bundle of integrated software that uses policy-based automation to configure, secure and track endpoints across their lifecycles.

Secure Passage FireMon v5.0

FireMon v5.0 is a distributed platform that actively monitors network devices and firewalls to provide configuration change control.

Trusted Computer Solutions Security Blanket Enterprise v3.1

Security Blanket Enterprise Edition v3.1 provides an organization with the ability to manage the secure configuration of servers throughout the enterprise and ensure that the ...

ZOHO ManageEngine DeviceExpert v5.3

DeviceExpert is a web-based, multivendor network configuration, change and compliance management (NCCCM) solution for network devices.

First Look

This is your SIM on steroids

Trying to dig up deeply hidden packets in huge amounts of data has always been among the most important tools in my analysis arsenal. But, ...

Advertisement

How to Prevent Insider Threats!

POLL