News
Rene Millman,
Sep 25, 2017
Trojan uses NSA EtneralBlue exploit to hijack computers for new ransomware campaign targeting unpatched systems.

Executive Insight

Opinion
Sep 25, 2017
Latest round of cyber-attacks underscore the need for regular security awareness training says Eldon Sprickerhoff.

SC Webcasts

Vendor Webcast

Rethink Security to Follow Identity

Last year, over $80 billion was spent on cyber security, yet two-thirds of organisations were still breached. The reason? 81% of data breaches involved weak, default...

x

Rethink Security to Follow Identity

Last year, over $80 billion was spent on cyber security, yet two-thirds of organisations were still breached. The reason? 81% of data breaches involved weak, default or stolen passwords.

Watch this webinar to learn why current threats and today’s hybrid IT environment require changes to old security models and how Identity Services defends your organisation against the most common cyber attacks.

We’ll examine:

  • The current (broken) state of security and the role identity plays in cyberattacks
  • The massive rethink under way that redefines security to follow identity
  • How Identity Services reduce the risk of breaches by over 50%
  • How Verizon and Centrify uniquely help reduce risk through the power of identity services.
  • *Verizon DBIR 2017
More Info

Sponsored by: Centrify

Vendor Webcast

Ever Changing Endpoint Security

It seems that no matter what we do, there will always be a new strain of malware designed to give CISOs grief. It might be called Wanna Cry, Pytra or any of thousand...

x

Ever Changing Endpoint Security

It seems that no matter what we do, there will always be a new strain of malware designed to give CISOs grief. It might be called Wanna Cry, Pytra or any of thousand different names but malware keeps evolving for a simple reason — it works. Today’s 20/20 looks at why malware works, why many of the common-sense defenses don’t and what CISOs should do about it.
More Info

Sponsored by: McAfee

Director's Cut

Features

PRODUCT REVIEWS

Carbon Black Cb Defense

Verdict: For a mix of threat analysis and incident response – where the core of the alert is malware-based – this one demands your attention. The Carbon Black experience is obvious.

Comodo Advanced Endpoint Protection

Verdict: This is a strong product under the covers but with a few warts for users. None of those are show-stoppers, though, and you would do well to take a close look at it.

SC Magazine Recommended

CrowdStrike Falcon

Verdict: This is a very sophisticated but rather specialised tool for the endpoint. If you are a large organisation or one with high-value information assets, this is well worth your time. For what it does, we know of no better tool available. We make this our cloud-based Recommended product.

SC Magazine Recommended

Cylance CylancePROTECT with CylanceOPTICS

Verdict: If you are using CylancePROTECT this is a no-brainer. If you are not, it’s a good reason to consider it. Because CylancePROTECT is one of our SC Lab Approved products, it already has our highest rating, but we are naming the OPTICS add-on Recommended for the value that it adds ...

SC Magazine Recommended

ESET Endpoint Security

Verdict: If you’re looking for a threat-focused endpoint tool at an attractive price point this is worth your attention. For its ease of use and deployment, we make this our on-premises Recommended tool.

Kaspersky Lab Endpoint Security for Business

Verdict: This is one of the strong players in this field. Although it shows, clearly, a legacy of anti-malware (to the point where it still refers to “anti-virus,” even though it really addresses all malicious software), this tool is a capable contender for endpoint security in general.

SC Magazine Best Buy

McAfee Endpoint Security

Verdict: An exceptional effort on behalf of the McAfee technical support team that provided the SC Lab with the opportunity to dedicate more time to testing the product package. Overall, an excellent product, but you’ll get the most out of it as part of the entire McAfee suite managed, as ours ...

Nyotron PARANOID

Verdict: Don’t pass this one by if you are looking at anti-malware. In our view, it certainly ranks in the top five such products we’ve seen over the past couple of years.

Whitepapers

How UEBA & UAM Supports Monitoring High Risk Positions

Some positions within companies require access to systems or digital assets. Payroll personnel, for example, need access to social security numbers, addresses, wages, and so forth...

Effective Incident Response Through User Activity Monitoring

The longer cyber incidents remain undiscovered, the more likely it will be that the company realizes a significant data breach. Such incidents cost the company millions in lost business...

4 Steps to Reduce the Risk of Malicious Insider Activity

The risk of malicious activity has never been more of a reality for organizations.

Implementing a User Activity & Behavior Monitoring program

Is there a way to implement user activity monitoring and behavior analytics that aligns to your corporate culture?

GET SC MEDIA UK DELIVERED TO YOUR INBOX