Along with innovation comes uniqueness, says Peter Stephenson, technology editor.
Access control is, arguably, the key aspect of information protection.
Analysis and testing covers the entire gamut of testing - from forensic tools to penetration testing.
Since it's all about the data why not go straight to the data and protect it directly?
How do we protect a perimeter that does not, physically, exist?
When we talk about the cloud, we need to realize that the concept of the cloud is a business, not a technical, construct.
The greatest pleasure that we have in writing this section each year is seeing who has the innovation and staying power to make it to the Hall of Fame.
This month we will look into three more. Identity management and network access control (NAC) are fairly obvious, while data leakage prevention (DLP) is, perhaps, not.
The EndaceProbe is a purpose-built enterprise-grade tool.
This month's product section focus on email security and management.
Securing mobile devices - and, by extension, our enterprises - is the topic of this month's Group Test.
Authentify has a good solution that addresses security and simplicity of management.
This month's products - and there are a slew of them - watch policy, make sure that you know what needs to be changed and what doesn't, and how your organization's risk picture has changed.
Over the past year, there have been numerous creative features added to just about every digital forensic tool that we reviewed.
This month we look at security information and event management (SIEM) tools.
FortiDDoS is an appliance that examines data packets in a variety of ways to separate DDoS packets from legitimate packets.
The notion of authentication is one that is so familiar to most of us that it hardly bears discussing. Or does it?
Now we get to the meat of the issue: Protecting the data directly.
These tools define and manage the security infrastructure by managing risk and implementing policy.
The cloud and its core enabling architecture virtualization needs a special kind of security.
This year's inductees have a loyal following, good year-on-year growth and the right stuff for their respective niches
Protecting the perimeter is usually about dealing with threats and this year's Innovators do a great job of addressing that.
This year, the information security industry has given all of us a gift of sorts: a bumper crop of new tools. And, we're calling out a number of Innovators, selected for standing out above the crowd.
It's all about protecting enterprise data, says Peter Stephenson, technology editor.
When we talk about access control, we usually assume that we are discussing all of its aspects, including identification, authentication and authorization.
There are two times when we need analysis and testing: before and after an event.
For the third year in a row, students in the computer forensic class of SC Magazine Technology Editor Peter Stephenson have produced this month's Group Test for digital forensic tools.