Features

Do we need a cyber-Chernobyl?

Do we need a cyber-Chernobyl?

What will it take for people to take security seriously?
Lisa Myers Jun 28 2011 4:23PM Security
Review: Modulo Risk Manager

Review: Modulo Risk Manager

This is a mature offering featuring a strong user interface with integrated process control. It offers a strong assessment-building and management process.
Michael Lipinski Jun 27 2011 2:46PM Security
Review: MetricStream Risk Management Solution

Review: MetricStream Risk Management Solution

Fully integrated, great reporting, nice incident management, fairly easy to get up and running, but it could be pricey in a large environment.
Michael Lipinski Jun 24 2011 4:56PM Security
Apple and the public cloud: new threats, new solutions

Apple and the public cloud: new threats, new solutions

Apple's iCloud will bring cloud computing to the masses and with it, new security challenges.
Jason Hart Jun 24 2011 10:56AM Security
Review: Apple's Thunderbolt MacBook Pro

Review: Apple's Thunderbolt MacBook Pro

Only the 13-inch device looks to deliver genuine value-for-money.
David Bayon Jun 24 2011 5:35AM Hardware
Review: Lightwave Security SecureAware

Review: Lightwave Security SecureAware

It has awareness tools and acknowledgements and testing, BCP inclusion, and a very nice UI but it costs a lot.
Michael Lipinski Jun 23 2011 4:11PM Security
Review: eGestalt Technologies SecureGRC

Review: eGestalt Technologies SecureGRC

It is a solid citation-based configurable risk model but is light on compliance content.
Michael Lipinski Jun 22 2011 2:27PM Security
Review: Agiliance RiskVision 6

Review: Agiliance RiskVision 6

This is a good assessment and ticketing tool with a closed loop process and all new dashboarding, but the user interface is challenging.
Michael Lipinski Jun 21 2011 3:17PM Security
War stories important to defence

War stories important to defence

Disclosure is a must so that the industry can learn from its mistakes.
Chris Mohan Jun 20 2011 4:22PM Security
Review: Tuffin Technologies Security Suite

Review: Tuffin Technologies Security Suite

Solid policy compliance management, as well as automated change management on network devices.
Peter Stephenson Jun 20 2011 2:46PM Security
Review: Tripwire Enterprise

Review: Tripwire Enterprise

Full-scale policy and configuration management with all the bells and whistles, but it can get quite pricey, comes with weak documentation and lacks free support.
Peter Stephenson Jun 17 2011 3:45PM Security
Review: Samsung Galaxy S II

Review: Samsung Galaxy S II

Zips along at a blitzkrieg pace.
Chris Jager Jun 17 2011 11:37AM Hardware
Review: Promisec INNERspace

Review: Promisec INNERspace

Highly flexible policy and endpoint management with an agentless deployment, but lacks online support.
Peter Stephenson Jun 16 2011 12:37PM Security
Review: New Net Technologies Change Tracker Enterprise

Review: New Net Technologies Change Tracker Enterprise

Solid feature set with full change management and monitoring, but it's expensive.
Peter Stephenson Jun 15 2011 2:27PM Security
Review: AlgoSec Security Management Suite

Review: AlgoSec Security Management Suite

A full-featured firewall policy and change management that is easy to manage.
Peter Stephenson Jun 14 2011 3:04PM Security
Review: IBM Tivoli Endpoint Manager

Review: IBM Tivoli Endpoint Manager

Great full-scale endpoint policy management and remediation, but the management console takes a bit of effort to get accustomed to.
Peter Stephenson Jun 10 2011 3:05PM Security
Review: Barracuda Web Filter 410

Review: Barracuda Web Filter 410

No per-user fees offsets a pricey subscription fee.
Staff Writers Jun 10 2011 10:30AM Security
Review: CronLab Light 1100 anti-spam appliance

Review: CronLab Light 1100 anti-spam appliance

Could this be the perfect anti-spam appliance for small businesses?
Dave Mitchell Jun 8 2011 9:53AM Security
Cybersecurity, the next frontier for NASA engineers

Cybersecurity, the next frontier for NASA engineers

A new nonprofit, linked to the Kennedy Space Center, wants to be the facilitator for the security industry.
Dan Kaplan Jun 2 2011 12:53PM Security
Security pros should trust noone

Security pros should trust noone

The zero-trust network framework, in which security is embedded into the network offers protection from threats and helps isolate and contain damage if an incident arises, but implementation isn't easy.
Angela Moscsaritolo Jun 2 2011 11:56AM Security

Log In

  |  Forgot your password?