Section Asset Image

Center for all IT-related crime content including data theft, ransomware to phishing scams, IoT hacks and malware.

Vulnerabilities
Greg Masters
May 26, 2017
Section Asset Image

Center for all content concerning IT infrastructures including cloud security, vulnerability management, crisis planning and more.

Vulnerabilities
Greg Masters
May 26, 2017

SC Fast Facts



Reboot ’17 Industry Innovators eBook



Editorial Staff Blogs

GET SC MEDIA DELIVERED TO YOUR INBOX

Product Reviews

SC Magazine Lab Approved

AlienVault Unified Security Management USM Appliance

Verdict: Not much to say here besides that this product is SC Lab Approved and that is our highest award. This is one of the best UTMs we’ve tested and over long periods of use it has delivered very well. We make it SC Lab Approved for another year.

EventTracker SIEMphonic

Verdict: Especially for organizations with limited expertise in applying all of the things a SIEM can do to protect their enterprises, this product is a must-see. However, any size organization can benefit by considering this as part of its security stack.

Fortinet FortiSIEM

Verdict: There is a lot to getting this one up and running, but once it’s up and you have the things you want to monitor plugged in, this one of the most complete SIEMs we’ve seen.

SC Magazine Best Buy

CorreLog SIEM Correlation Server

Verdict: We like this a lot, especially for SMBs, although larger organizations certainly should not rule it out as too small. It’s not. For its value and feature set, as well as the efforts to improve and keep the product ahead of the curve, we make this our Best Buy.

Whitepapers

Secure DevOps Survival Guide

Do you have the knowledge, tools and strategies to survive in DevOps? Download this guide to understand why development organizations are switching to DevOps, and how to shift the...

Solution Brief: Security when off the corporate network, off the ...

The bottom line is that the VPN is not always-on despite best practice policies. And your firewall, proxy, and AV is not enough to protect your mobile workforce. Learn how the DNS...

Automating Incident Response: How Security Orchestration Will Improve your Life

Even the best security teams get overwhelmed with security alerts. Triage methods require teams to decide which alerts to respond to, while automated incident response and security...

Navigating the New York Department of Financial Services’ Cybersecurity Regulations

Officials are eyeing regulations for handling data, particularly in the financial services sector. Learn more about regulations from the NY Department of Financial Services and how...