SC Staff,
May 26, 2017
In Case You Missed It: £1m CISO: WannaCry- Exploit hoarding; Terror exploit kit; GDPR penalty driven; Dutch & 7 others ranked

Executive Insight

May 26, 2017
Jean-Frederic Karcher discusses how firms need to stop insecure communications from having a negative impact on their bottom line.

SC Webcasts

Vendor Webcast

De-Perimeterisation and Going Beyond Multi-Factor Authentication

13th June at 2:00pm BST || Learn about how business environments can use MFA on the road to de-perimeterisation and zero-trust models to improve internal security...


De-Perimeterisation and Going Beyond Multi-Factor Authentication

Once you have multi-factor authentication (MFA) installed, how do you take it further in your overall access control programme? 

The idea of getting rid of the perimeter can be intimidating for businesses to contemplate, especially if they’ve only recently solidified one. So let’s not think of it as getting rid of the perimeter, but rather as tightening security on the inside so that the perimeter isn’t the only thing keeping the attacker at bay.

If you’re already in the hybrid environment -- with some of your infrastructure on-premises and some in the cloud -- it’s time to think about re-balancing your security policies, because you already have assets that aren’t within your perimeter.
More Info

Sponsored by: Duo Security




SC Magazine Lab Approved

AlienVault Unified Security Management USM Appliance

Verdict: Not much to say here besides that this product is SC Lab Approved and that is our highest award. This is one of the best UTMs we’ve tested and over long periods of use it has delivered very well. We make it SC Lab Approved for another year.

EventTracker SIEMphonic

Verdict: Especially for organisations with limited expertise in applying all of the things a SIEM can do to protect their enterprises, this product is a must-see. However, any size organisation can benefit by considering this as part of its security stack.

Fortinet FortiSIEM

Verdict: There is a lot to getting this one up and running, but once it’s up and you have the things you want to monitor plugged in, this one of the most complete SIEMs we’ve seen.

SC Magazine Best Buy

CorreLog SIEM Correlation Server

Verdict: We like this a lot, especially for SMBs, although larger organisations certainly should not rule it out as too small. It’s not. For its value and feature set, as well as the efforts to improve and keep the product ahead of the curve, we make this our Best Buy.

McAfee Enterprise Security Manager ESM

Verdict: Since this already is SC Lab Approved, we can’t give it a higher rating. We like this well enough that we are extending its SC Lab Approved designation for another year. It continues to be our key analysis tool.

SC Magazine Recommended

LogRhythm Threat Lifecycle Management Platform

Verdict: This is an important contender for your SOC SIEM. It will take data from just about anything you need to monitor and it includes solid third-party threat feed access. This is our Recommended product.

Sophos XG Firewall

Verdict: This demands your attention no matter what size your organisation. There are models to cover most requirements.

Splunk Enterprise Security

Verdict: This is a product with which you pretty much can’t go wrong, especially since it integrates with most products that need the log management and analysis that it does. It is sort of a SIEM’s SIEM.


Enterprise Phishing Susceptibility Report

Phishing attacks are the largest challenge to organizations because they target all employees. This report examines factors that lead to successful phishing campaigns and how empowering...

SC Media eBook on Threat Intelligence

This eBook looks at threat intelligence techniques used to detect cyberespionage and provides recommendations on what companies can do immediately to reduce exposure. Threat intelligence...

Forrester Report: The Total Economic Impact of PhishMe's Human Phishing ...

Download this Forrester report to learn how organizations saw an 80% average reduction in phishing click rates by employees and a 30% productivity increase across security operations...

Osterman Research: Techniques for Dealing with Ransomware, BEC, and Spearphishing

Download this whitepaper to learn why phishing threats remain a high concern for major IT decision makers, as well as key steps organizations can take to improve defenses against phishing...