Editorial Staff Blogs

Executive Insight

Product Reviews

NNT Change Tracker Generation 7

Verdict: For the change management required for compliance in just about all regulatory requirements, this is a very strong contender.

Allgress Insight Risk Manager

Verdict: Well worth looking at for those with a need for a complete risk management tool.

Tufin Orchestration Suite

Verdict: We would like to see some form of auto discovery beyond what is available currently. Verdict This one is well worth your time, but be sure that you have everything on your enterprise identified so that the Suite can access it and collect data.

Modulo Risk Manager

Verdict: This is a gold standard of GRC systems. It has all of the bells and whistles that you need and just about nothing that you don’t.

LockPath Keylight Platform

Verdict: Solid, hard-core GRC.

Acuity Risk Management STREAM Integrated Risk Manager

Verdict: Solid, versatile risk management tool that can fit organizations of just about any size – from the single consultant to large enterprises.

AlgoSec Security Management Solution

Verdict: This is an excellent tool, especially for mid- to large-sized organizations. It has everything you need and is comfortably manageable. We compare it to a sailboat – even though it’s fairly large and complex, can be sailed effectively by a single person.

Whitepapers

Whaling: Anatomy of an Attack

Email impersonation attacks are a growing concern for organizations of any size. These scams have led to more than $2.3 billion in losses over the last three years. Download this...

Network Based Security Playbook Guide

You've seen the headlines: cyber breaches at major corporations jeopardizing confidential information for millions of users; highly targeted spear phishing campaigns delivering malware...

Breach Detection Systems: Product Selection Guide

Breach detection systems are tools offering timely detection of threats - measured by traditional factors as well as advanced metrics. Download this guide for a comprehensive look...

Best Practices for Dealing with Phishing and Next-Generation Malware

Phishing and malware threats are skyrocketing as cybercriminals become more adept and stealthier in penetrating IT security defenses. Read this white paper to learn how users can...

@SC Magazine

HTML asset sc Twitter template

GET SC MEDIA DELIVERED TO YOUR INBOX

Sponsored Links