Editorial Staff Blogs

Executive Insight

SC Fast Facts



Product Reviews

NNT Change Tracker Generation 7

Verdict: For the change management required for compliance in just about all regulatory requirements, this is a very strong contender.

Allgress Insight Risk Manager

Verdict: Well worth looking at for those with a need for a complete risk management tool.

Tufin Orchestration Suite

Verdict: We would like to see some form of auto discovery beyond what is available currently. Verdict This one is well worth your time, but be sure that you have everything on your enterprise identified so that the Suite can access it and collect data.

Modulo Risk Manager

Verdict: This is a gold standard of GRC systems. It has all of the bells and whistles that you need and just about nothing that you don’t.

LockPath Keylight Platform

Verdict: Solid, hard-core GRC.

Acuity Risk Management STREAM Integrated Risk Manager

Verdict: Solid, versatile risk management tool that can fit organizations of just about any size – from the single consultant to large enterprises.

AlgoSec Security Management Solution

Verdict: This is an excellent tool, especially for mid- to large-sized organizations. It has everything you need and is comfortably manageable. We compare it to a sailboat – even though it’s fairly large and complex, can be sailed effectively by a single person.

Whitepapers

SC Media eBook on Encryption

With all the current talk about Apple, Safe Harbor and other encryption issues, this eBook will look at the state of encryption and how it has become as much a business issue as it...

Inside the Legal Cloud

Scale-to-Zero: An In-Depth Look at the Economics of Cloud Computing for Enterprise Legal Departments

The Ultimate Guide to Getting Started with Application Security

Application-layer attacks are growing much more rapidly than infrastructure attacks. Download the Ultimate Guide to Getting Started With Application Security now for details!

Assessing Application Security: A Buyer’s Guide

Organizations lack resources and need to look to external services when preventing application security breaches. This guide provides a straightforward method for acquiring the services...

@SC Magazine

HTML asset sc Twitter template

GET SC MEDIA DELIVERED TO YOUR INBOX

Sponsored Links