Product Reviews News, Articles and Updates
Moving enterprise apps to the cloud is becoming a very attractive option for organizations striving to cut IT costs while improving agility and scalability.
Off the field, demand for bandwidth and protection from network threats set the ball in motion for the Denver Broncos. Greg Masters reports.
Private Core vCage protects systems. It's a little complicated under the covers, but in practical use is simplicity itself.
Umbrella from OpenDNS, a cloud-based network security service, is easy to use and an excellent intelligence resource.
Silobreaker is a must-have collection and analysis tool for organizations that might benefit from open source intelligence (OSINT).
This month, our Technology Editor Peter Stephenson looks at risk and policy management.
Gathered here are some of the most comprehensive digital forensic tools available.
AhnLab refers to its product - MDS - as a malware defense system. I, however, think of it more as a malware management system.
SIEMs today are powerful beasts and they are necessary - if not always sufficient - for the protection of your enterprise.
X1 is an agentless SAP auditing tool that is able to map out entire SAP landscapes and display any insecure configurations on the individual elements of the landscape.
A few years back, I boldly predicted that UTMs would merge into a single product type with gateways and SIEMs. Boy, did I get that wrong!
CIRT from AccessData Group is a full lifecycle forensic tool - from detecting to analyzing to remediating - and it's all in a single package.
We are "ethical hackers" or "white hat hackers." We are penetration testers. Never let us be aligned with the mass media's view of hackers.
We're off to another year. I read recently where one security maven is referring to 2014 as the "Year of Cryptolocker."
iScan uses a really neat approach to vulnerability and PAN (looking for credit card, etc.) scanning.
Along with innovation comes uniqueness, says Peter Stephenson, technology editor.
Access control is, arguably, the key aspect of information protection.
Analysis and testing covers the entire gamut of testing - from forensic tools to penetration testing.
Since it's all about the data why not go straight to the data and protect it directly?
How do we protect a perimeter that does not, physically, exist?
When we talk about the cloud, we need to realize that the concept of the cloud is a business, not a technical, construct.
The greatest pleasure that we have in writing this section each year is seeing who has the innovation and staying power to make it to the Hall of Fame.
This month we will look into three more. Identity management and network access control (NAC) are fairly obvious, while data leakage prevention (DLP) is, perhaps, not.
The EndaceProbe is a purpose-built enterprise-grade tool.
This month's product section focus on email security and management.
Securing mobile devices - and, by extension, our enterprises - is the topic of this month's Group Test.
Authentify has a good solution that addresses security and simplicity of management.
This month's products - and there are a slew of them - watch policy, make sure that you know what needs to be changed and what doesn't, and how your organization's risk picture has changed.
Over the past year, there have been numerous creative features added to just about every digital forensic tool that we reviewed.
This month we look at security information and event management (SIEM) tools.
SC Magazine Articles
- USAA members hit with multiple phishing attacks
- Industry pros react to Cisco, Fortinet advisories after possible Snowden NSA leak
- Trust exercise: Symantec's new website security expert is reaching out to hacker community
- U.S. government extends offer to protect states from electoral cyberthreats
- Two-thirds of IT security pros surveyed expect a breach to hit their company, report
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- CEO sacked after aircraft company grounded by whaling attack
- Microsoft warns of new, self-propagating ransomware in the wild
- Wendy's POS breach 'considerably' bigger than first thought