News
Rene Millman,
Dec 15, 2017
Emotet offensive sees malware continually repackaging itself to avoid signature-based detection

Executive Insight

Opinion
Dec 15, 2017
The essence of IAM (identity and access management) is ensuring that the right people, have the right access, to the right resources, in the right ways, and that you can prove all those "rights" to the people that need to know.

SC Webcasts

Vendor Webcast

Before you spend another penny on cyber-security – have you got your foundations right?

If you don't establish a solid base to build your cyber-security from, your efforts may not yield the positive results you anticipated.

x

Before you spend another penny on cyber-security – have you got your foundations right?

You wouldn’t build your house on sand, but if your expensive new IT tools are installed on shaky security foundations your organisation could be swept away in the next wave of cyber-attacks. 

Prioritise common weaknesses, ensure reliable file integrity; enable efficient change monitoring and system hardening; engage in effective vulnerability management – and don’t neglect log management. 

This webinar will show you how. And with a solid foundation in place, you can then go out and spend on the latest AI toys, safe in the knowledge you aren’t doing so without having already covered the essentials.

More Info

Sponsored by: Tripwire

Vendor Webcast

Identifying the Unknown: Spotting Malicious Activity When Everything Else Fails

It is no exaggeration that enterprises can run on average 25 security products concurrently, as it is the case with financial services organisations, according...

x

Identifying the Unknown: Spotting Malicious Activity When Everything Else Fails

It is no exaggeration that enterprises can run on average 25 security products concurrently, as it is the case with financial services organisations, according to research firm Ovum. And yet sometimes, 25 products can be as good as zero.

Organisations can suffer from a false sense of security thinking they’re better protected than organisations running fewer security products. But in fact, it could be quite the opposite. Much like the law of diminishing returns, the more products, the more alerts, and the more alerts, the higher your chances are of wasting time investigating the same threat more than once—keeping you from focusing on other, more critical threats.

Join Golan Ben-Oni, Global Chief Information Officer at IDT Corporation, and Gil Barak, Co-Founder and Chief Technology Officer at Secdo, as they show you how alerts can be streamlined to simplify threat hunting and find what would have otherwise been overlooked by other tools. Attendees will learn:

  • What is threat-level visibility and how it gives you a far more granular view into potential threats than user-level or kernel-level access to endpoint activity ever could
  • What steps can be taken to automate and simplify alert analysis to eliminate time spent chasing down redundant alerts and false positives
  • How to optimise your security workflow following an incident
More Info

Sponsored by: Secdo

Director's Cut

Features

PRODUCT REVIEWS

Carbon Black Cb Defense

Verdict: For a mix of threat analysis and incident response – where the core of the alert is malware-based – this one demands your attention. The Carbon Black experience is obvious.

Comodo Advanced Endpoint Protection

Verdict: This is a strong product under the covers but with a few warts for users. None of those are show-stoppers, though, and you would do well to take a close look at it.

SC Magazine Recommended

CrowdStrike Falcon

Verdict: This is a very sophisticated but rather specialised tool for the endpoint. If you are a large organisation or one with high-value information assets, this is well worth your time. For what it does, we know of no better tool available. We make this our cloud-based Recommended product.

SC Magazine Recommended

Cylance CylancePROTECT with CylanceOPTICS

Verdict: If you are using CylancePROTECT this is a no-brainer. If you are not, it’s a good reason to consider it. Because CylancePROTECT is one of our SC Lab Approved products, it already has our highest rating, but we are naming the OPTICS add-on Recommended for the value that it adds ...

SC Magazine Recommended

ESET Endpoint Security

Verdict: If you’re looking for a threat-focused endpoint tool at an attractive price point this is worth your attention. For its ease of use and deployment, we make this our on-premises Recommended tool.

Kaspersky Lab Endpoint Security for Business

Verdict: This is one of the strong players in this field. Although it shows, clearly, a legacy of anti-malware (to the point where it still refers to “anti-virus,” even though it really addresses all malicious software), this tool is a capable contender for endpoint security in general.

SC Magazine Best Buy

McAfee Endpoint Security

Verdict: An exceptional effort on behalf of the McAfee technical support team that provided the SC Lab with the opportunity to dedicate more time to testing the product package. Overall, an excellent product, but you’ll get the most out of it as part of the entire McAfee suite managed, as ours ...

Nyotron PARANOID

Verdict: Don’t pass this one by if you are looking at anti-malware. In our view, it certainly ranks in the top five such products we’ve seen over the past couple of years.

Whitepapers

SC Media eBook on Threat Intelligence

This eBook looks at how you can focus your threat intelligence feeds and tune your network hardware to provide the data you need.

SC Media eBook on Internet of Things

IoT devices need not even be connected directly to the internet to become corporate vulnerabilities.

SC Media eBook on DDoS

Today’s attackers can corral millions of systems infected with malware to launch focused botnet attacks that can easily bring down targeted servers.

SC Media eBook on Insider Threat

Not all threats are malicious. Well-intentioned employees represent a risk vector just as severe as others.

GET SC MEDIA UK DELIVERED TO YOUR INBOX