Features
Features
-
Voltage SecureMail encryption tool: Product overview
Expert contributor Karen Scarfone takes a look at Voltage SecureMail for encrypting email messages in the enterprise. Continue Reading
-
Trend Micro Email Encryption: Product overview
Expert contributor Karen Scarfone examines Trend Micro's suite of email encryption software products for securing email messages in the enterprise. Continue Reading
-
DataMotion SecureMail software: Product overview
Expert contributor Karen Scarfone examines DataMotion SecureMail software for encrypting email messages in the enterprise. Continue Reading
-
Symantec Desktop Email Encryption: Product overview
Expert contributor Karen Scarfone examines Symantec Desktop Email Encryption, a tool for encrypting email messages for individuals within the enterprise. Continue Reading
-
Proofpoint Email Encryption: Product overview
Expert contributor Karen Scarfone examines Proofpoint Email Encryption products, which come with data loss prevention capability and a Secure Share add-on for secure file sharing. Continue Reading
-
Can cybersecurity spending protect the U.S. government?
CNAP articulates the right things, as many U.S. government cyber initiatives do, but what has captured the attention of the Beltway is the billion-dollar budget proposals. Continue Reading
-
What endpoint protection software is on your short list?
Roughly half of survey respondents indicated that their organization is shifting away from static scanning as the primary protection for endpoints. Continue Reading
-
Managing Online Risk
In this excerpt of Managing Online Risk, author Deborah Gonzalez outlines the main steps of a risk management model. Continue Reading
-
Information Governance and Security: Protecting and Managing Your Company's Proprietary
In this excerpt of Information Governance and Security, authors John G. Iannarelli and Michael O'Shaughnessy offer tips for establishing guidelines for all departments or sectors of a business. Continue Reading
-
Integrated Security Systems Design
In this excerpt of Integrated Security Systems Design, author Thomas L. Norman explains the tools of security system design, the place of electronics in the process, how to establish electronic security program objectives and the types of design ... Continue Reading
-
Securing VoIP: Keeping Your VoIP Networks Safe
In this excerpt of Securing VoIP: Keeping your VoIP Network Safe, author Regis (Bud) Bates outlines different approaches to VoIP security and offers best practices to ensure infrastructure security is intact. Continue Reading
-
Detecting and Combating Malicious Email
In this excerpt of Detecting and Combating Malicious Email, authors Julie JCH Ryan and Cade Kamachi discuss the elements of an email structure and touch on how attackers can use these elements to trick unwitting victims. Continue Reading
-
Designing and Building Security Operations center
In this excerpt of Designing and Building Security Operations Center, author David Nathans reviews the infrastructure needed to support a SOC and maintain SOC security. Continue Reading
-
Information security book excerpts and reviews
Visit the Information Security Bookshelf for book reviews and free chapter downloads. Continue Reading
-
Addressing NFV security issues in the enterprise
Network functions virtualization can complement SDN and benefit enterprises, but there are NFV security considerations that must be addressed. Expert Judith Myerson explains. Continue Reading
-
What EMM tool is on your short list?
EMM vendors consolidate tools for enterprise mobility management, covering device, application and even identity management, into ‘single-pane-of-glass' management consoles. Continue Reading
-
Bug bounty programs narrow the crowd
Data shows that more companies are moving away from crowdsourcing and adopting invitation-only awards programs. Do higher-quality submissions result? Continue Reading
-
The incident response process is on the clock
No time to prepare for incident handling? Security tools aim to automate the incident response process and help organizations lessen the time between threat detection and response. Continue Reading
-
Comparing the best network access control products
Expert Rob Shapland takes a look at the best network access control products on the market today and examines the features and capabilities that distinguish the top vendors in this space. Continue Reading
-
Comparing the top big data security analytics tools
Expert Dan Sullivan compares how the top-rated big data security analytics tools measure up against each other to help you select the right one for your organization. Continue Reading
-
Comparing the top vulnerability management tools
Expert Ed Tittel compares how the top-rated vulnerability management tools measure up against each other so you can select the right one for your organization. Continue Reading
-
Windows 10 Wi-Fi Sense for hotspot sharing: Is it safe?
Microsoft's Windows 10 Wi-Fi Sense was designed to make hotspot sharing easy, but experts debate if the security risks are real and whether the new feature offers substantial benefits and relative safety. Continue Reading
-
Readers' top picks for DLP products
The companies and DLP products that organizations consider, when they seek to address compliance and data security requirements across multiple platforms and environments. Continue Reading
-
Deconstructing the emergency incident response process
Professional incident response providers can quickly bring the additional resources and the expertise that companies often need to handle a rapidly unfolding threat. Continue Reading
-
Security attack? New defenses in 2016 escape compromise
Worried that attackers may know your infrastructure better than you do? Cyberthreats are learning fast from defenses that detect them. New strategies focus on what happens next. Continue Reading
-
Dell SonicWall NSA UTM: Product overview
Expert David Strom explains why the feature-rich Dell SonicWall NSA Series of enterprise unified threat management devices may take some getting used to. Continue Reading
-
WatchGuard UTM appliances: Product overview
Expert Ed Tittel examines WatchGuard UTM appliances that bundle different kinds of network infrastructure protection into a single device for small, midsize and large businesses. Continue Reading
-
Sophos SG Series UTM: Product overview
Expert Ed Tittel looks at the Sophos SG Series of unified threat management appliances, which bundle various kinds of network infrastructure protection into a single device. Continue Reading
-
Fortinet FortiGate UTM: Product overview
Expert Ed Tittel looks at Fortinet FortiGate UTM appliances, which combine different network infrastructure protection features into a single device. Continue Reading
-
Cisco Meraki MX appliances: UTM product overview
Expert Ed Tittel examines Cisco's Meraki MX UTM Appliances, a series of UTM products that combines various network security and protection features into a single device. Continue Reading
-
Check Point UTM Threat Prevention Appliances: Product review
Check Point UTM Threat Prevention Appliances are recognized by our reviewer as consistent software architectures that are easy to configure. Continue Reading
-
Seven criteria for buying vulnerability management tools
Expert contributor Ed Tittel describes purchasing criteria for full-featured vulnerability management tools for small organizations to large enterprises. Continue Reading
-
The business case for vulnerability management tools
Expert Ed Tittel describes business use cases for vulnerability management tools and examines how organizations of all sizes benefit from these products. Continue Reading
-
Introduction to vulnerability management tools
Expert Ed Tittel explores how vulnerability management tools can help organizations of all sizes uncover defense weaknesses and close security gaps before they are exploited by attackers. Continue Reading
-
Trend Micro InterScan Messaging Security: Product overview
Expert Karen Scarfone looks at the Trend Micro InterScan Messaging Security and Trend Micro ScanMail Suite for Microsoft Exchange email security gateway products used for monitoring email messages that could contain suspicious content and threats. Continue Reading
-
Symantec Messaging Gateway and Symantec Email Security.cloud: Product overview
Expert Karen Scarfone examines the Symantec Messaging Gateway and Symantec Email Security.cloud email security gateway products that detects and blocks messages that contain suspicious content and threats. Continue Reading
-
Sophos Email Appliance: Product overview
Expert Karen Scarfone examines the Sophos Email Appliance email security gateway product that is used for detecting and blocking messages that contain suspicious content and threats. Continue Reading
-
Proofpoint Enterprise Protection: Product overview
Expert Karen Scarfone examines the Proofpoint Enterprise Protection email security gateway product, which scans inbound and outbound email messages for malware, phishing and spam threats. Continue Reading
-
Microsoft Exchange Online Protection: Product overview
Expert Karen Scarfone reviews the Microsoft Exchange Online Protection email security gateway product, which is used for detecting and blocking common email-transmitted threats. Continue Reading
-
McAfee Email Protection, Security for Email Servers: Product overview
Expert Karen Scarfone reviews the McAfee Email Protection and McAfee Security for Email Servers products that are used for monitoring, blocking and quarantining email messages. Continue Reading
-
Clearswift SECURE Email Gateway: Product overview
Expert Karen Scarfone reviews the Clearswift SECURE Email Gateway product, which monitors incoming and outgoing emails. Continue Reading
-
Fortinet FortiMail: Product overview
Expert Karen Scarfone reviews the Fortinet FortiMail email security gateway product that is used for monitoring email messages on behalf of an organization. Continue Reading
-
Cybersecurity professionals: Five ways to increase the talent pool
The lack of cybersecurity skills in the industry is glaring, but there are ways for educators, vendors and enterprises to fix the problem. Sean Martin explains how. Continue Reading
-
Websense Email Security Gateway: Product overview
Expert Karen Scarfone reviews the Websense Email Security Gateway product, which is used for monitoring email messages that could contain suspicious threats. Continue Reading
-
Cisco Email Security Appliance: Product overview
Expert Karen Scarfone reviews Cisco's Email Security Appliance product that is designed for detecting and blocking email-borne threats. Continue Reading
-
How to amp up enterprise security with a suite of tools
Vendors are increasingly offering security via a suite of tools. Here's how to use them to improve enterprise security while avoiding the drawbacks like functions overlap. Continue Reading
-
Readers' top picks for application security tools
The top companies and application security products that organizations consider when they seek to reduce their application vulnerabilities. Continue Reading
-
Virtualization security tools defend across clouds
Several vendors offer ways to protect virtual machines both in the data center and in the cloud. How do these products differ from what's available from VMware or Amazon Web Services? Continue Reading
-
Integrated security suite? How to avoid tool overlap
The versatility of Swiss Army knife-like platforms may override existing security controls. Here's how to cut out overlap and get the most function out of multi-tools. Continue Reading
-
Five factors for evaluating big data security analytics platforms
Expert Dan Sullivan outlines criteria for evaluating big data security analytics platforms for collecting, analyzing and managing large volumes of data generated for information security purposes. Continue Reading
-
The business case for big data security analytics
Expert Dan Sullivan explores the emerging category of big data security analytics and outlines the vital capabilities and key benefits of the technology for enterprises. Continue Reading
-
Hewlett Packard Enterprise's ArcSight ESM: SIEM product overview
Expert Karen Scarfone analyzes HPE's ArcSight Enterprise Security Management (ESM), a security information and event management (SIEM) tool used for collecting security log data. Continue Reading
-
EMC RSA Security Analytics: SIEM product overview
Expert Karen Scarfone examines EMC RSA Security Analytics, a SIEM product for harvesting, analyzing and reporting on security log data across the enterprise. Continue Reading
-
AlienVault OSSIM: SIEM Product overview
Expert Karen Scarfone checks out AlienVault's Open Source SIEM and Unified Security Management products for collecting event data from various security logs within an organization. Continue Reading
-
Splunk Enterprise: SIEM product overview
Expert Karen Scarfone examines Splunk Enterprise, a security information and event management (SIEM) product for collecting and analyzing event data to identify malicious activity. Continue Reading
-
SolarWinds Log and Event Manager: SIEM product overview
Expert Karen Scarfone examines SolarWinds Log and Event Manager, a security information and event management (SIEM) tool for collecting and analyzing event data to identify malicious activity. Continue Reading
-
IBM Security QRadar: SIEM product overview
Expert Karen Scarfone takes a look at IBM Security QRadar, a security information and event management (SIEM) tool used for collecting and analyzing security log data. Continue Reading
-
LogRhythm's Security Intelligence Platform: SIEM product overview
Expert Karen Scarfone examines LogRhythm's Security Intelligence Platform, a SIEM tool for analyzing collected data. Continue Reading
-
Introduction to big data security analytics in the enterprise
Expert Dan Sullivan explains what big data security analytics is and how these tools are applied to security monitoring to enable broader and more in-depth event analysis for better enterprise protection. Continue Reading
-
Comparing the best intrusion prevention systems
Expert contributor Karen Scarfone examines the best intrusion prevention systems to help you determine which IPS products may be best for your organization. Continue Reading
-
Lessons in mobile data loss protection for enterprise IT pros
With mobile devices everywhere in the enterprise now, learning tactics for data loss protection must become an IT priority. Continue Reading
-
Comparing the top Web fraud detection systems
Expert Ed Tittel explores the features of the top Web fraud detection systems and compares critical purchasing criteria. Continue Reading
-
Drowning in a sea of cybersecurity tools?
Here’s how to conquer the steady stream of new technologies and find the best security tools beyond point solutions. Continue Reading
-
Readers’ top picks for advanced threat detection
Companies and functionality organizations are targeting when they seek to bolster their defenses through threat detection and analytics. Continue Reading
-
Readers’ top picks for enterprise firewalls
The companies and key functionality organizations seek out when they upgrade or add firewall technology to their enterprise environments. Continue Reading
-
Leaky enterprise: Data loss tops mobile security threats
With the absence of high-profile breaches, mobile data protection is still on the backburner at some organizations. Why it’s time to change course. Continue Reading
-
Three criteria for selecting the right IPS products
Expert contributor Karen Scarfone examines important criteria for evaluating intrusion prevention system (IPS) products for use by an organization. Continue Reading
-
Vormetric Transparent Encryption: Product overview
Expert Ed Tittel takes a look at Vormetric Transparent Encryption, a component of Vormetric's Data Security Platform that encrypts data and does access control for that data. Continue Reading
-
HP Security Voltage's SecureData Enterprise: Product overview
Expert Ed Tittel examines SecureData Enterprise, which is a part of the HP Security Voltage platform, a scalable database security product that encrypts both structured and unstructured data, tokenizing data to prevent viewing and more. Continue Reading
-
Trustwave DbProtect: Database security tool overview
Expert Ed Tittel checks out Trustwave DbProtect, a centrally managed enterprise-level database activity monitor that includes vulnerability assessment functionality. Continue Reading
-
Protegrity Database Protector: Database security tool overview
Expert Ed Tittel examines Protegrity Database Protector, a database security add-on product that provides column- and field-level protection of confidential and sensitive data stored in nearly any type of relational database. Continue Reading
-
Fortinet FortiDB: Database security tool overview
Expert Ed Tittel examines Fortinet FortiDB, an add-on product for better securing databases through database activity monitoring and vulnerability assessment. Continue Reading
-
Oracle Advanced Security: Database security tool overview
Expert Ed Tittel examines Oracle Advanced Security, a database security add-on product with transparent data encryption (TDE) and data redaction features. Continue Reading
-
McAfee Database Activity Monitoring: Database security tool overview
Expert Ed Tittel takes a look at McAfee Database Activity Monitoring and McAfee Vulnerability Manager for Databases to see how they protect enterprises' databases and corporate data. Continue Reading
-
Imperva SecureSphere: Database security tool overview
Expert Ed Tittel examines Imperva SecureSphere Database Activity Monitoring and Database Assessment, products that are deployed as an inline bridge or as a lightweight agent to assess and monitor local database access. Continue Reading
-
IBM Guardium: Database security tool overview
Expert Ed Tittel examines IBM Guardium, a security product that offers continuous, real-time, policy-based monitoring of database activities. Continue Reading
-
Enterprise benefits of network intrusion prevention systems
Expert Karen Scarfone explains how most organizations can benefit from intrusion prevention systems (IPSes), specifically dedicated hardware and software IPS technologies. Continue Reading
-
Windows 10 security fixes longtime OS vulnerabilities
Windows 10 security incorporates years of improvements to remove or mitigate long-term issues with Windows vulnerabilities. Continue Reading
-
The basics of network intrusion prevention systems
Expert Karen Scarfone explores intrusion prevention systems and their acquisition, deployment and management within the enterprise. Continue Reading
-
Five criteria for purchasing Web fraud detection systems
Expert Ed Tittel describes the purchasing criteria for Web fraud detection systems and explains how they can protect banking, e-commerce and other industries. Continue Reading
-
Emerging security threats you're up against now
Learn about the 'hacking as a service' and other emerging security threats. Continue Reading
-
Comparing the best data loss prevention products
Expert Bill Hayes examines the strengths and weaknesses of top-rated data loss prevention (DLP) products to help enterprises make the right purchasing decision. Continue Reading
-
Hacking and Penetration Testing with Low Power Devices
In this excerpt of Hacking and Penetration Testing with Low Power Devices, author Philip Polstra describes "The Deck" -- a custom Linux distribution -- that breaks the traditional penetration model by providing pen testers an OS that runs on ... Continue Reading
-
Cyber Reconnaissance, Surveillance and Defense
In this excerpt of Cyber Reconnaissance, Surveillance and Defense, author Robert Shimonski describes commonly used mobile technology and how phone tracking works. Continue Reading
-
Cyber Crime and Cyber Terrorism Investigator's Handbook
In this excerpt of Cyber Crime and Cyber Terrorism Investigator's Handbook, authors Babak Akhgar, Andrew Staniforth and Francesca Bosco outline the classification, types and categories of cybercrime. Continue Reading
-
Building an Information Security Awareness Program
In this excerpt of Building an Information Security Awareness Program, authors Bill Gardner and Valerie Thomas discuss why lecturing is an ineffective method of security awareness programs and offer alternative measures enterprises should consider. Continue Reading
-
Choose the best vulnerability assessment tools
This Buyer's Essentials guide helps InfoSec pros assess vulnerability management products by explaining how they work and by highlighting key features corporate buyers should look for so they can evaluate vendor offerings. Continue Reading
-
Cybersecurity investment pays more than monetary dividends
Companies are investing in cybersecurity startups to reap the benefits of working with problem-solving technology. Continue Reading
-
The CISO role rises: How is it working out?
An unusual game of musical chairs is unfolding as companies scramble to ensure information security and shore up their ranks to the tune of regulators. Continue Reading
-
Five supporting technologies for DLP products
Expert Bill Hayes examines five technologies that can complement data loss prevention products and improve enterprise security. Continue Reading
-
How to deploy the right DLP products for the right jobs
Expert Bill Hayes maps specific data loss prevention products to three deployment scenarios to better help readers make their own purchase decisions. Continue Reading
-
The best SSL VPN products in the market
SSL VPNs are essential for securing network connections and communications. Here's a look at the best SSL VPN products in the industry. Continue Reading
-
Comparing the best Web application firewalls in the industry
Expert Brad Causey compares the best Web application firewalls on the market across three types of product types: cloud, integrated and appliance. Continue Reading
-
Four enterprise scenarios for Web fraud detection systems
Expert Ed Tittel describes use cases for Web fraud detection systems and products and explains how they can increase account and transaction security. Continue Reading
-
Warnings, neglect and a massive OPM data breach
Why no one should have been surprised by the massive government Office of Personnel Management data hack. Continue Reading
-
App security: Surviving the merger and acquisition process
Some companies are trying to head off information security glitches before they sign on the dotted line, with help from security officers. Continue Reading
-
Introduction to Web fraud detection systems
Expert Ed Tittel explores the purpose of Web fraud detection systems and services, which are designed to reduce the risks inherent in electronic payments and e-commerce. Continue Reading
-
Comparing the top database security tools
Expert Ed Tittel examines the strengths and weaknesses of top-rated database security tools -- from database activity monitoring to transparent database encryption -- to help enterprises make the right purchasing decision. Continue Reading
-
Nine steps for purchasing database security tools
Expert Adrian Lane lays out the criteria for procuring the right database security software for your enterprise. Continue Reading
-
Developing an IAM strategy for third-party vendors
This Beyond the Page informs InfoSec pros of the security concerns related to third-party vendor access, and how an enterprise IAM strategy can help. Continue Reading