Product Reviews

What You Need to Know about Securing Access to Your Private Cloud

Moving enterprise apps to the cloud is becoming a very attractive option for organizations striving to cut IT costs while improving agility and scalability.

Forward progress: How the Denver Broncos really play defense

Forward progress: How the Denver Broncos really play defense

By

Off the field, demand for bandwidth and protection from network threats set the ball in motion for the Denver Broncos. Greg Masters reports.

Attestation at its best

Attestation at its best

By

Private Core vCage protects systems. It's a little complicated under the covers, but in practical use is simplicity itself.

Bits and bytes in intelligence: Umbrella from OpenDNS

Bits and bytes in intelligence: Umbrella from OpenDNS

By

Umbrella from OpenDNS, a cloud-based network security service, is easy to use and an excellent intelligence resource.

Soft intelligence is important too: Silobreaker

Soft intelligence is important too: Silobreaker

By

Silobreaker is a must-have collection and analysis tool for organizations that might benefit from open source intelligence (OSINT).

Mitigating risk is not as simple as it seems

Mitigating risk is not as simple as it seems

By

This month, our Technology Editor Peter Stephenson looks at risk and policy management.

Digging deep with forensic tools

Digging deep with forensic tools

By

Gathered here are some of the most comprehensive digital forensic tools available.

AhnLab's MDS: A comprehensive approach to malware management

AhnLab's MDS: A comprehensive approach to malware management

By

AhnLab refers to its product - MDS - as a malware defense system. I, however, think of it more as a malware management system.

The more things change...

The more things change...

By

SIEMs today are powerful beasts and they are necessary - if not always sufficient - for the protection of your enterprise.

Covering all the SAP bases

Covering all the SAP bases

By

X1 is an agentless SAP auditing tool that is able to map out entire SAP landscapes and display any insecure configurations on the individual elements of the landscape.

UTMs are still defining themselves

UTMs are still defining themselves

By

A few years back, I boldly predicted that UTMs would merge into a single product type with gateways and SIEMs. Boy, did I get that wrong!

Digital forensic incident response in a box

Digital forensic incident response in a box

By

CIRT from AccessData Group is a full lifecycle forensic tool - from detecting to analyzing to remediating - and it's all in a single package.

Pen testing or hacking?

Pen testing or hacking?

By

We are "ethical hackers" or "white hat hackers." We are penetration testers. Never let us be aligned with the mass media's view of hackers.

Happy New Year: Who are you?

Happy New Year: Who are you?

By

We're off to another year. I read recently where one security maven is referring to 2014 as the "Year of Cryptolocker."

iScan, uScan, we allScan...  and its cheap and easy to do

iScan, uScan, we allScan... and its cheap and easy to do

By

iScan uses a really neat approach to vulnerability and PAN (looking for credit card, etc.) scanning.

Industry Innovators 2013

Industry Innovators 2013

By

Along with innovation comes uniqueness, says Peter Stephenson, technology editor.

2013 Industry Innovators: Access control

2013 Industry Innovators: Access control

By

Access control is, arguably, the key aspect of information protection.

2013 Industry Innovators: Analysis and control

2013 Industry Innovators: Analysis and control

By

Analysis and testing covers the entire gamut of testing - from forensic tools to penetration testing.

2013 Industry Innovators: Data protection

2013 Industry Innovators: Data protection

By

Since it's all about the data why not go straight to the data and protect it directly?

2013 Industry Innovators: Perimeter defense

2013 Industry Innovators: Perimeter defense

By

How do we protect a perimeter that does not, physically, exist?

2013 Industry Innovators: Virtualization and cloud security

2013 Industry Innovators: Virtualization and cloud security

By

When we talk about the cloud, we need to realize that the concept of the cloud is a business, not a technical, construct.

2013 Industry Innovators: Hall of Fame

2013 Industry Innovators: Hall of Fame

By

The greatest pleasure that we have in writing this section each year is seeing who has the innovation and staying power to make it to the Hall of Fame.

Access control has many dimensions

Access control has many dimensions

By

This month we will look into three more. Identity management and network access control (NAC) are fairly obvious, while data leakage prevention (DLP) is, perhaps, not.

EndaceProbe: High-speed packet recording for security monitoring

EndaceProbe: High-speed packet recording for security monitoring

By

The EndaceProbe is a purpose-built enterprise-grade tool.

Your online life is an open book - maybe

Your online life is an open book - maybe

By

This month's product section focus on email security and management.

Protecting the data - from wherever it streams

Protecting the data - from wherever it streams

By

Securing mobile devices - and, by extension, our enterprises - is the topic of this month's Group Test.

Really secure, multifactor SSO

Really secure, multifactor SSO

By

Authentify has a good solution that addresses security and simplicity of management.

Risk and reward: Policy management tools

Risk and reward: Policy management tools

By

This month's products - and there are a slew of them - watch policy, make sure that you know what needs to be changed and what doesn't, and how your organization's risk picture has changed.

Digital forensic tools mature

Digital forensic tools mature

By

Over the past year, there have been numerous creative features added to just about every digital forensic tool that we reviewed.

SIEM City

By

This month we look at security information and event management (SIEM) tools.

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US