SC Magazine - November 2007
Is continuous testing of applications more vital than testing at the initial code level?
Clothing retailer Gap Inc. revealed that a laptop containing the Social Security numbers of 800,000 job applicants was stolen from a third-party vendor. The laptop ...
2 minutes on
Me and my job
Recent reports indicate that identity thieves are reaching out beyond the grave and stealing the identity of the newly departed.
Deloitte Touche Tohmatsu's recently released security survey revealed that 37 percent of the top 100 global financial services organizations don't have a security strategy, and ...
The government vertical presents special challenges to IT security vendors, but all agree it is a growing market, reports Greg Masters.
Despite the progress made since FISMA implementation, government agencies have a lot of work ahead, says Deb Radcliff.
All levels of government face critical issues in securing their data - whether shared via the web or through email, USB sticks or IM.
As biometric technologies gain further acceptance, one retailer fights insider theft with fingerprint readers, reports Jim Carr.
Many businesses are finding VoIP to be worth the money, but are their systems prepared for attacks? Frank Washkuch investigates.
Karl Hart is one ISO who sees organizations saving big bucks by virtualizing their data centers, but risks loom, reports Dan Kaplan.
Data in, data out - it all needs protecting. This month we are concentrating on the data that should not enter your network and the ...
eDiscovery made easier, cheaper and faster
A good all-around product with a large feature set. The unit can be a bit of a challenge for organizations that do not need all ...
A complete enterprise firewall loaded with more features than most organizations will ever need.
A firewall for the largest enterprises with a price point and a feature set that keeps the unit out of small-to-medium sized enterprises.
A good product with a large number of features and an easy-to-use interface.
For its ease of use and deployment, good pricing and comprehensive protection, we award the BigFix DLP our Best Buy.
This product works best with its companion desktop version, but if you archive a lot of sensitive data (law offices, medical officers, intellectual property, etc.), ...
Use this tool alongside other tools that handle leakage vectors other than email.
if you need very strong data leakage protections with powerful forensics, this is the product for you. For its unique approach to forensics, we designate ...
Use this in its automatic inspection mode with an email extrusion prevention system for pretty complete extrusion coverage.
We don't recommend this as your only extrusion prevention tool. Used along with one of the other tools reviewed here, however, it can be a ...
If you have a small-to-medium-sized enterprise and want to manage data leakage through the network, this is a good product for you.
An excellent product with a lot of capability if you can afford it. Best for larger implementations, especially as part of an overall McAfee implementation.
For mid-sized organizations (up to 12,000 users), this is about as good as it gets feature-wise.
Now that DefCon 15 has passed, I'm feeling the need to have a really good reason to dredge up people's happy, but increasingly distant memories ...