In this month's cover story, we hear from one of our SC World Congress keynote speakers, Heartland Payment System's CEO Robert Carr
Conficker, which is both a worm and a bot, is one of the more sophisticated pieces of malicious software (malware) we have seen to date.
Increased efficiency is a driving factor for organizations adopting role-based access control.
Cybersecurity is one of the greatest societal challenges of the 21st century. It transcends technology and affects our privacy, financial systems, health care, economy and ...
A top-ranked opera company took the drama out of its internet operations with malware protection, reports Greg Masters.
CEO Bob Carr plans to use the breach at Heartland to push advancement within the payment industry, Dan Kaplan reports.
With international collaboration, prosecutions of cybercrimes are becoming more common, reports Angela Moscaritolo.
The second annual SC World Congress, to be held Oct. 13-14 in New York, brings together leading voices in the information security field.
With DRM for digital music in its death throes, how will it fare in other industries relying on digital copyright protections? Deb Radcliff reports.
A highly motivated workforce creates a protection system, says Justin Somaini.
The Threat Manager v3.5.4 with ActiveWatch Monitoring Service from Alert Logic combines intrusion protection and vulnerability management in one device that offers proactive and reactive ...
The Network-Based Firewall service provided by AT&T protects a customer’s WAN by providing secure inbound and outbound internet access through security gateways. This service also ...
The Clone Systems Clone Guard Managed Security Suite provides protection from malicious threats against VoIP, web or customized applications. This service detects, logs, prevents and ...
The F-Secure Protection Service for Business is a completely integrated security platform which consists of two parts. The first part is comprised of client applications ...
The IBM Managed Protection Service combines a full security monitoring staff with security monitoring devices to manage, monitor and respond to security threats on a ...
The Network Box managed service features a UTM appliance that includes three firewalls, three IDS/IPS systems, VPNs, anti-virus, anti-malware, anti-spyware, anti-spam and content filtering.
The Firewall and Intrusion Detection and Prevention service from Perimeter eSecurity provides 24/7 real-time protection and comprehensive reporting.
The core of the SecureWorks managed services is the Sherlock Security Platform. With this platform, SecureWorks can bring together and aggregate all logs and events ...
The Managed IPS/IDS from Symantec is a fully managed system with Sourcefire IPS as its backbone. Alongside of the IPS, Symantec can also manage many ...
Cyveillance provides services that cover the entire spectrum of online risks - from fraud and identity theft, phishing and unlicensed product sales to corporate espionage.
MX Logic’s Complete Security is a package that includes email defense, web defense and archiving services. The package of services can also be provided separately.
Nowell Shalom Security Platform is a cloud-based security as a service (SaaS) offering that is intended to protect against malicious insiders and impostors stealing information ...
SecureWorks provides real-time, 24/7 monitoring and analysis of host logs, leveraging its proprietary Sherlock Security Management Platform.
StillSecure’s ProtectPoint managed security service provides a combination of firewall; intrusion detection/prevention; gateway virus, spam and content filtering; VPN and vulnerability scanning.
In any online transaction, businesses must confront a significant and growing challenge: How to verify a customer’s identity in real time without diminishing the customer’s ...
Trustwave provides end-to-end managed security services to protect against common malware, spam, phishing, zero-day threats, botnets and even fraud and insider abuse.
XyberSecure’s XyberShield is a global security as a service (SaaS) offering designed to protect users from website-level security threats.
The emerging popularity of virtual computing has very few blemishes considering its youth. One of those, unfortunately, is security both of the underlying operating environment ...