Product Reviews

Mitigating risk is not as simple as it seems

Mitigating risk is not as simple as it seems

By

This month, our Technology Editor Peter Stephenson looks at risk and policy management.

Digging deep with forensic tools

Digging deep with forensic tools

By

Gathered here are some of the most comprehensive digital forensic tools available.

AhnLab's MDS: A comprehensive approach to malware management

AhnLab's MDS: A comprehensive approach to malware management

By

AhnLab refers to its product - MDS - as a malware defense system. I, however, think of it more as a malware management system.

The more things change...

The more things change...

By

SIEMs today are powerful beasts and they are necessary - if not always sufficient - for the protection of your enterprise.

Covering all the SAP bases

Covering all the SAP bases

By

X1 is an agentless SAP auditing tool that is able to map out entire SAP landscapes and display any insecure configurations on the individual elements of the landscape.

UTMs are still defining themselves

UTMs are still defining themselves

By

A few years back, I boldly predicted that UTMs would merge into a single product type with gateways and SIEMs. Boy, did I get that wrong!

Digital forensic incident response in a box

Digital forensic incident response in a box

By

CIRT from AccessData Group is a full lifecycle forensic tool - from detecting to analyzing to remediating - and it's all in a single package.

Pen testing or hacking?

Pen testing or hacking?

By

We are "ethical hackers" or "white hat hackers." We are penetration testers. Never let us be aligned with the mass media's view of hackers.

Happy New Year: Who are you?

Happy New Year: Who are you?

By

We're off to another year. I read recently where one security maven is referring to 2014 as the "Year of Cryptolocker."

iScan, uScan, we allScan...  and its cheap and easy to do

iScan, uScan, we allScan... and its cheap and easy to do

By

iScan uses a really neat approach to vulnerability and PAN (looking for credit card, etc.) scanning.

Industry Innovators 2013

Industry Innovators 2013

By

Along with innovation comes uniqueness, says Peter Stephenson, technology editor.

2013 Industry Innovators: Access control

2013 Industry Innovators: Access control

By

Access control is, arguably, the key aspect of information protection.

2013 Industry Innovators: Analysis and control

2013 Industry Innovators: Analysis and control

By

Analysis and testing covers the entire gamut of testing - from forensic tools to penetration testing.

2013 Industry Innovators: Data protection

2013 Industry Innovators: Data protection

By

Since it's all about the data why not go straight to the data and protect it directly?

2013 Industry Innovators: Perimeter defense

2013 Industry Innovators: Perimeter defense

By

How do we protect a perimeter that does not, physically, exist?

2013 Industry Innovators: Virtualization and cloud security

2013 Industry Innovators: Virtualization and cloud security

By

When we talk about the cloud, we need to realize that the concept of the cloud is a business, not a technical, construct.

2013 Industry Innovators: Hall of Fame

2013 Industry Innovators: Hall of Fame

By

The greatest pleasure that we have in writing this section each year is seeing who has the innovation and staying power to make it to the Hall of Fame.

Access control has many dimensions

Access control has many dimensions

By

This month we will look into three more. Identity management and network access control (NAC) are fairly obvious, while data leakage prevention (DLP) is, perhaps, not.

EndaceProbe: High-speed packet recording for security monitoring

EndaceProbe: High-speed packet recording for security monitoring

By

The EndaceProbe is a purpose-built enterprise-grade tool.

Your online life is an open book - maybe

Your online life is an open book - maybe

By

This month's product section focus on email security and management.

Protecting the data - from wherever it streams

Protecting the data - from wherever it streams

By

Securing mobile devices - and, by extension, our enterprises - is the topic of this month's Group Test.

Really secure, multifactor SSO

Really secure, multifactor SSO

By

Authentify has a good solution that addresses security and simplicity of management.

Risk and reward: Policy management tools

Risk and reward: Policy management tools

By

This month's products - and there are a slew of them - watch policy, make sure that you know what needs to be changed and what doesn't, and how your organization's risk picture has changed.

Digital forensic tools mature

Digital forensic tools mature

By

Over the past year, there have been numerous creative features added to just about every digital forensic tool that we reviewed.

SIEM City

By

This month we look at security information and event management (SIEM) tools.

Stopping distributed denial-of-service attacks

Stopping distributed denial-of-service attacks

By

FortiDDoS is an appliance that examines data packets in a variety of ways to separate DDoS packets from legitimate packets.

Familiarity breeds carelessness

Familiarity breeds carelessness

By

The notion of authentication is one that is so familiar to most of us that it hardly bears discussing. Or does it?

Industry Innovators: Security infrastructure

Industry Innovators: Security infrastructure

By

These tools define and manage the security infrastructure by managing risk and implementing policy.

Industry Innovators: Data protection

Industry Innovators: Data protection

By

Now we get to the meat of the issue: Protecting the data directly.

Industry Innovators: Virtualization & cloud security

Industry Innovators: Virtualization & cloud security

By

The cloud and its core enabling architecture virtualization needs a special kind of security.

Sign up to our newsletters

POLL