SC Staff,
Jul 21, 2017
In Case You Missed It: IoT home vulnerability; Cyber attacks cost £40 bn; Bupa insider data leak; dual malware vectors; Dow Jones data at risk

Executive Insight

Jul 21, 2017
As high net worth individuals and celebrities find their personal data under attack, so the rise of cyber-advisors to the rich and famous have begun to make an appearance.

SC Webcasts

Vendor Webcast

Dealing with the Storm – The U.K.’s 2017 Data Threat Landscape

There is a data storm coming your way, make sure you are prepared for the storm!


Dealing with the Storm – The U.K.’s 2017 Data Threat Landscape

Enterprises in U.K. are experiencing a storm of global proportions around their data – It starts with a growing need for data to power business growth, and expands with strict regulatory requirements, advanced technology deployments and escalating cyber-attacks – and it’s putting their data at risk.

In this webinar we’ll look deeply into the results for the 5th annual 2017 Thales Data Threat report, with a focus on the results for the U.K. and comparisons against global competitors.  Learn both about the threats, but also about what enterprises are doing about them – and best practice recommendations from IT security analysts at 451 Research.

  • How data breaches keep growing in spite of increased IT security spend – and what some of the reasons for that trend are
  • How advanced technologies such as Containers, IoT, Big Data and Cloud change the required approach to protecting critical and sensitive information
  • How new data privacy regulations are shaping enterprise plans for data security
  • What barriers enterprises encounter to deploying and using data security tools – and how to overcome them


More Info

Sponsored by: Thales e-Security

Director's Cut



Carbon Black Cb Defense

Verdict: For a mix of threat analysis and incident response – where the core of the alert is malware-based – this one demands your attention. The Carbon Black experience is obvious.

Comodo Advanced Endpoint Protection

Verdict: This is a strong product under the covers but with a few warts for users. None of those are show-stoppers, though, and you would do well to take a close look at it.

SC Magazine Recommended

CrowdStrike Falcon

Verdict: This is a very sophisticated but rather specialised tool for the endpoint. If you are a large organisation or one with high-value information assets, this is well worth your time. For what it does, we know of no better tool available. We make this our cloud-based Recommended product.

SC Magazine Recommended

Cylance CylancePROTECT with CylanceOPTICS

Verdict: If you are using CylancePROTECT this is a no-brainer. If you are not, it’s a good reason to consider it. Because CylancePROTECT is one of our SC Lab Approved products, it already has our highest rating, but we are naming the OPTICS add-on Recommended for the value that it adds ...

SC Magazine Recommended

ESET Endpoint Security

Verdict: If you’re looking for a threat-focused endpoint tool at an attractive price point this is worth your attention. For its ease of use and deployment, we make this our on-premises Recommended tool.

Kaspersky Lab Endpoint Security for Business

Verdict: This is one of the strong players in this field. Although it shows, clearly, a legacy of anti-malware (to the point where it still refers to “anti-virus,” even though it really addresses all malicious software), this tool is a capable contender for endpoint security in general.

SC Magazine Best Buy

McAfee Endpoint Security

Verdict: An exceptional effort on behalf of the McAfee technical support team that provided the SC Lab with the opportunity to dedicate more time to testing the product package. Overall, an excellent product, but you’ll get the most out of it as part of the entire McAfee suite managed, as ours ...


Verdict: Don’t pass this one by if you are looking at anti-malware. In our view, it certainly ranks in the top five such products we’ve seen over the past couple of years.


Threat Hunting: Answering “Am I Under Attack?”

Threat hunting returns to the basic tenets of information security: reviewing your IT environment for signs of malicious activity and operational deficiencies. Download this whitepaper...

2017 Threat Hunting Survey Report

Organizations realize threat hunting is the next step in the evolution of the modern Security Operations Center (SOC). Download this whitepaper to gain insight on the state of threat...

The Incident Response Success Checklist

Details matter when developing an incident response (IR) plan, but even the most successful IR plans can lack critical steps. Download this whitepaper to find what important steps...

The Seven Struggles of Detection & Response - How Manual ...

This white paper introduces the concept of proactive breach detection and discusses its advantages.