June 2008 19 6 Issue of SCMagazine

June 2008 19 6 Issue of SCMagazine

June issue


Some help from the government

A robust public/private partnership can be more firmly established.


Get educated about spam

Humans are oftentimes gullible and inquisitive, and spammers are taking full advantage.

Building a security culture

It takes reinforcement to drive home a security message.

CSO's desk

Show your value to the business

Even if vendor security is not on the radar of your regulators or auditors, you may still want to consider how a vendor information security ...


Data driven

Alex Tosheff, Bill Me Later's new CISO, says understanding and protecting data is now priority number one, reports Dan Kaplan.

Outwitting scam email

There are strategies to combat thieves looking to exploit people's benevolence in providing personal info, reports Eric Butterman.

Holy grail of IDs

Federated identity management solutions offer the promise of single sign-on, but are slow to see adoption, Jim Carr discovers.

A toast to the winners

Raise a glass of Champagne to honor the winners of the SC Magazine Awards 2008.

Product Reviews

Email makes the world go 'round

Email is the grease that makes today's business run smoothly, says Peter Stephenson.

Cryptzone Secured eMail Enterprise v3.2

Cryptzone’s Secured eMail Enterprise v3.2 is a desktop client application that integrates into Microsoft Outlook or Lotus Notes to provide email encryption.

PGP Universal Gateway Email 2.8

A soft appliance email security solution offered as an integrated part of the PGP Encryption Platform.

Sendmail Sentrion DS 3.0

A rack-mounted email authentication appliance used strictly for applying digital signatures to outbound emails.

Tumbleweed Secure Messenger 6.3

Two components work together to form an enterprise-class content and identity filtering solution.

Clearswift MIMEsweeper Email Appliance

We found this product to be a pumped up email data leakage prevention device with solid email protection.

eSoft ThreatWall 450

A full scale email content management appliance with several excellent features.

IBM Proventia Network Mail Security System

This product features some high grade functionality for the large enterprise.

GFi MailSecurity

Offers protection from email-based threats, such as viruses or trojans.

Marshal's MailMarshal SMTP

A software-based approach to email content management that features protection against spam, phishing, viruses and other malware.


This product has an expansive filtering engine comprised of over 200 separate rules.

Optenet Mailsecure Appliance

This appliance features an email filter, anti-virus, anti-spyware and protection against malicious code and spam.

Red Earth Software Policy Patrol Enterprise

A feature rich product that can be installed directly onto the mail server.

SECNAP SpammerTrap

A dedicated spam detection and protection tool.

Secure Computing IronMail

Designed for the large enterprise and loaded with many great features.

SonicWALL Email Security 400

Provides full functional protection with solid filtering capabilities.

Sophos ES1000

Provides a full realm of email content management and security features.

SpamTitan for VMware

This product is a VMware image that can be loaded onto any available server on the network, thereby not needing any real dedicated appliance or ...

Sunbelt Software Ninja Email Security

This product takes an all-in-one security approach with features such as anti-spam, anti-phishing, anti-virus, attachment filtering, disclaimers and content filtering.

Symantec Mail Security 8300 Series

The Symantec Mail Security appliance houses several email content management features in one well-integrated device.

Tumbleweed Communications MailGate

The Tumbleweed MailGate appliance offers solid email protection and management in one device.

Technology Pathways e.s.i.Discover Search Appliance

Simple elegance for your forensic investigation

Entrust Entelligence v9.1

The Entelligence Messaging Server v9.1 is an appliance-based email gateway that provides encryption and digital signing of messages internally and externally to the organization.

Last Word

Arm against app vulnerabilities

IT pros must think about changing their security focus, says Michelle Drolet.