November 2009 Issue of SCMagazine

November 2009 Issue of SCMagazine

November 20th anniversary issue


Look how far we've come

We and the industry of which we are a contented part, have flourished over these last 20 years.


Industry pioneers

There have been countless professionals who have helped shape the information security industry - whether through regulations, technological innovation, policy and standards creation and more. ...

Market entrepreneurs

A handful of folks whose technical savvy, inventive spirit and business acumen helped to enliven the IT security industry.

What's to come?

The IT landscape has evolved over the past two decades. Where it is headed is anyone's guess, reports Chuck Miller.

Seizing management power

Over the past decade, the role of the CISO has morphed from introverted techie into slick businessperson, reports Dan Kaplan.

What's old is new again

Today, criminals are using amped-up techniques to tap into a perpetual cycle of fraud and identity theft, reports Deb Radcliff.

The state of the industry

A number of experts share their (sometimes droll) thoughts on the past and future of the IT industry, reports Angela Moscaritolo.

Buy-in from the boss

For the most part, your senior management understands the necessity of running a secure company, reports Angela Moscaritolo.

In session

The second annual SC World Congress brought together leading voices and key decision-makers in the IT security industry.

Through the ages: A timeline

A lot has happened in the 20 years that SC Magazine has been covering the IT and information security marketplace. As the field has grown ...

Product opener

Twenty years of reporting on information security

There is a bit of everything here in our products section. We have over 30 contributors to a special piece on the evolution of the ...

Product Reviews

Perspective: 20 years of security

There is a wealth of insight, reminiscence and brilliant looks into the future here from a number of leading figures in the IT security arena.

Last Word

Hello, mouth. Meet foot.

Dan Kaplan closes this special issue with lame predictions from the past 20 years by some big names.

Products: Industry Innovators

Altor Networks Altor VF

There are several aspects of using Altor VF that are tailor-made for a virtualized environment.

Amenaza SecurITree

This is really an analysis tool in the sense that we use it to model the risks that could impact our network.

Axent NetRecon

NetRecon, developed by Axent Technologies, was the first really non-intrusive network vulnerability scanner.

Black Box Veri-NAC

This is a product that solves a very important problem – network access management – in an inexpensive and simple manner.

Core Impact

When it comes to pen testing, there is nothing that this tool either cannot or won’t soon do for you.

CPN Tools

CPN Tools is a state machine modeling tool. Translation: you can use CPN Tools to model any process and then simulate the results.

i2 Analyst’s Notebook

SecurITree and others that can lead you to the conclusion of a really tough security problem.

mi5 Webgate (now part of Symantec)

For web-based leakage threats, Webgate is the ticket.

Mu Dynamics Mu 4000

We’re still finding cool functions that we can coax out of the 4000.


Nessus has become the basis for several appliances

NetIQ’s Secure Configuration Manager

NetIQ’s Secure Configuration Manager is one powerful tool.

Nitro Security’s NitroView

NitroView is a security information and event manager (SIEM), but is much more, really, than that.

Passlogix v-GO products

For its simplicity, comprehensive feature set and ease of use, we add v-GO to the list.

Password Recovery Toolkit

This is a legitimate password recovery tool, and today it can recover passwords from over 80 applications.


For its many benefits, from many levels of protection to strong functionality, is why PGP made it to this list.

ProDiscover IR

ProDiscover IR (PD-IR) was designed from the ground up as an incident response tool.


For its ability to be deployed rapidly, its comprehensive capabilities and the superb open source community support, Snort has to be one of our favorites.

SolarWinds Engineer’s Toolset

The price is right, the capabilities are strong and it has a long heritage of excellence.

Wetstone Gargoyle Investigator

Wetstone takes a pretty broad view of malware.


As a general purpose workhorse, Wireshark is a great tool.