SC Fast Facts



Reboot ’17 Industry Innovators eBook



Editorial Staff Blogs

GET SC MEDIA DELIVERED TO YOUR INBOX

Product Reviews

SC Magazine Lab Approved

AlienVault Unified Security Management USM Appliance

Verdict: Not much to say here besides that this product is SC Lab Approved and that is our highest award. This is one of the best UTMs we’ve tested and over long periods of use it has delivered very well. We make it SC Lab Approved for another year.

EventTracker SIEMphonic

Verdict: Especially for organizations with limited expertise in applying all of the things a SIEM can do to protect their enterprises, this product is a must-see. However, any size organization can benefit by considering this as part of its security stack.

Fortinet FortiSIEM

Verdict: There is a lot to getting this one up and running, but once it’s up and you have the things you want to monitor plugged in, this one of the most complete SIEMs we’ve seen.

SC Magazine Best Buy

CorreLog SIEM Correlation Server

Verdict: We like this a lot, especially for SMBs, although larger organizations certainly should not rule it out as too small. It’s not. For its value and feature set, as well as the efforts to improve and keep the product ahead of the curve, we make this our Best Buy.

Whitepapers

SC Media Cyber Insurance eBook

Cyber insurance is a volatile industry with lots of confusion about what’s covered and what’s not. A recent Appeals Court case for the 4th District ruled that general business insurance...

Executive Summary: Building Trust in a Cloudy Sky

Over 90% of companies now use the cloud, yet IT is clearly struggling to secure these services. Download this condensed executive summary of the “Building Trust in a Cloudy Sky” report...

SC Media eBook on GDPR

This eBook looks at what your should be doing today to get yourself ready to do business with companies that must be GDPR compliant.

Combating the Top 4 Sources of Software Vulnerabilities

The growing dependence on applications, combined with companies locking down other areas of infrastructure, makes applications a target for cybercriminals. Check out this eBook for...