News

Executive Insight

Opinion
Apr 25, 2018
Stephen Moore examines the role that cyber-attribution can play in the wake of a data breach and discusses whether it should be a seen as a fundamental step in every incident response or whether it is merely a 'nice to have'.

Videos

Videos

Videos

SC Webcasts

20/20 Webcast

Is it safe? How to embrace Cloud efficiency without compromising data security

How to develop an effective and efficient digitalisation strategy

x

Is it safe? How to embrace Cloud efficiency without compromising data security

“Digital transformation” means many things to different industries, and deploying a cloud environment hosting sensitive data can appear a daunting decision to take. However, the benefits of flexibility and scalability of a cloud-based IT environment can enable organisations to embrace a more efficient way of working, with better customer engagement and experience.

Tune into this webinar, in partnership with Thales and CenturyLink, and you will learn:

  • How to develop an effective and efficient digitalisation strategy
  • Why proactive security of data can protect your reputation, employees and customers
  • How best to protect data on a cloud platform and ensure it is as secure as possible
More Info

Sponsored by: Thales e-Security

20/20 Webcast

GDPR takes a village: Practical advice to help you achieve compliance

The GDPR compliance deadline signals a big shift for organisations handling data

x

GDPR takes a village: Practical advice to help you achieve compliance

The GDPR compliance deadline signals a big shift for organisations handling data. But it shouldn’t be about doing the bare minimum to avoid big fines. Instead, show customers your commitment by changing how your organisation uses and protects information.

Every employee has an important role to play but many don’t even realise it.

You need each person who handles, has access to, or may inadvertently see personal data to learn the basics of data protection so they can take appropriate steps when they encounter data in their work.

Join guests Enza Iannopollo, Analyst at Forrester Research and Doug Snow, VP of Customer Success, TITUS on April 20th at 2pm BST as we’ll discuss:

  • Why collaboration across the organisation is essential
  • The role of data discovery and classification to mitigate risk
  • The importance and benefits of building a culture of security
More Info

Sponsored by: TITUS

20/20 Webcast

Zero Trust Security: Never trust, always verify!

It's time to get serious about cracking down on data breaches

x

Zero Trust Security: Never trust, always verify!

Organisations spent a combined £123 billion on cybersecurity in 2016 and 2017. During the same period, 66 percent of organisations experienced and average of five or more data breaches. A larger security budget simply won’t solve the cyber security problem. An entirely new approach is required — Zero Trust Security.

The benefits of Zero Trust Security are crucially important in this climate of ever increasing number and scope of security breaches. Zero Trust Security:

  • Covers the broadest range of attack surfaces, ranging from users, endpoints, and networks to resources
  • Enables organisations to increase business agility through the secure adoption of cloud and mobile solutions
  • Provides a framework to properly manage the risk of exposing sensitive apps and infrastructure to business partners
  • Creates satisfied, productive users by ensuring the proper controls are in place to address appropriate levels of risk without requiring a heavy-handed, maximum-control approach regardless of the risk posed 

Join Barry Scott, EMEA CTO to learn more about Zero Trust, what it means for your business and how you can put it into practice.

More Info

Sponsored by: Centrify

Features

PRODUCT REVIEWS

Carbon Black Cb Defense

Verdict: For a mix of threat analysis and incident response – where the core of the alert is malware-based – this one demands your attention. The Carbon Black experience is obvious.

Comodo Advanced Endpoint Protection

Verdict: This is a strong product under the covers but with a few warts for users. None of those are show-stoppers, though, and you would do well to take a close look at it.

SC Magazine Recommended

CrowdStrike Falcon

Verdict: This is a very sophisticated but rather specialised tool for the endpoint. If you are a large organisation or one with high-value information assets, this is well worth your time. For what it does, we know of no better tool available. We make this our cloud-based Recommended product.

SC Magazine Recommended

Cylance CylancePROTECT with CylanceOPTICS

Verdict: If you are using CylancePROTECT this is a no-brainer. If you are not, it’s a good reason to consider it. Because CylancePROTECT is one of our SC Lab Approved products, it already has our highest rating, but we are naming the OPTICS add-on Recommended for the value that it adds ...

SC Magazine Recommended

ESET Endpoint Security

Verdict: If you’re looking for a threat-focused endpoint tool at an attractive price point this is worth your attention. For its ease of use and deployment, we make this our on-premises Recommended tool.

Kaspersky Lab Endpoint Security for Business

Verdict: This is one of the strong players in this field. Although it shows, clearly, a legacy of anti-malware (to the point where it still refers to “anti-virus,” even though it really addresses all malicious software), this tool is a capable contender for endpoint security in general.

SC Magazine Best Buy

McAfee Endpoint Security

Verdict: An exceptional effort on behalf of the McAfee technical support team that provided the SC Lab with the opportunity to dedicate more time to testing the product package. Overall, an excellent product, but you’ll get the most out of it as part of the entire McAfee suite managed, as ours ...

Nyotron PARANOID

Verdict: Don’t pass this one by if you are looking at anti-malware. In our view, it certainly ranks in the top five such products we’ve seen over the past couple of years.

Whitepapers

GET SC MEDIA UK DELIVERED TO YOUR INBOX