Executive Insight

SC Fast Facts

Director's Cut Video

Product Reviews

NNT Change Tracker Generation 7

Verdict: For the change management required for compliance in just about all regulatory requirements, this is a very strong contender.

Allgress Insight Risk Manager

Verdict: Well worth looking at for those with a need for a complete risk management tool.

Tufin Orchestration Suite

Verdict: We would like to see some form of auto discovery beyond what is available currently. Verdict This one is well worth your time, but be sure that you have everything on your enterprise identified so that the Suite can access it and collect data.

Modulo Risk Manager

Verdict: This is a gold standard of GRC systems. It has all of the bells and whistles that you need and just about nothing that you don’t.

LockPath Keylight Platform

Verdict: Solid, hard-core GRC.

Acuity Risk Management STREAM Integrated Risk Manager

Verdict: Solid, versatile risk management tool that can fit organizations of just about any size – from the single consultant to large enterprises.

AlgoSec Security Management Solution

Verdict: This is an excellent tool, especially for mid- to large-sized organizations. It has everything you need and is comfortably manageable. We compare it to a sailboat – even though it’s fairly large and complex, can be sailed effectively by a single person.

Skybox Security Suite

Verdict: This is a first-class product, straightforward to use and very flexible in its functionality.


Solving the Data Migration Challenge with Modern Endpoint Backup

Modern endpoint backup utilizes automatic, continuous backup to assure backup is always up to the minute, minimizes costs and eliminates. Download the white paper to learn how to...

SC Magazine eBook on Business Continuity Planning and Disaster Recovery

Last November, hackers rendered the computers and telecommunications at Sony Pictures inoperable and plundered its servers of everything...

DDoS: The Stakes Have Changed. Have You?

Arbor Networks secures the world's most demanding and complex networks from DDoS attacks and advanced threats.

Application Session Filtering Cookbook

This guide presents a number of examples of how to use Application Session Filtering (ASF) in step-by-step recipes.

@SC Magazine

HTML asset sc Twitter template


Sponsored Links