Network Security
Max Metzger,
Feb 23, 2017
National Cyber Security Centre technical director Dr Ian Levy explained how the government will create a more rational approach to cyber-security.
Feb 24, 2017
Nelesh Kotecha explains what can be done by organisations to prevent security threats to IoT devices from the design stage all the way through to going to market.

SC webcasts

Vendor Webcast

The New Enterprise Security Model: How to Prevent, Detect and Respond

7th March at 2:00pm GMT || In this webinar, we’ll review the current landscape of security challenges.


The New Enterprise Security Model: How to Prevent, Detect and Respond

In today’s computing world, the nature of the network perimeter has changed. The threat of data breaches is growing and CISOs are faced with a monumental challenge: securing information wherever it resides, without interfering with the productivity of the increasingly mobile and connected workforce. The ramifications of poor cloud security decisions have become a boardroom issue. In this webinar, we’ll review the current landscape of security challenges and discuss:

  • How adopting cloud solutions improves your security posture;

  • Why effective security measures start with a great user experience;

  • Why contextual user access data is the key to unlocking smarter security policies

More Info

Sponsored by: Okta


Section Asset Image

Centre for all content concerning IT infrastructures including cloud security and more.



Catbird Secure

Verdict: This has long been one of our favourite products and it is well worth considering.

CloudPassage Halo

Verdict: Good, well though-out tool and, if you are looking for out-of-the-box compliance capabilities, this one demands your attention.

SC Magazine Recommended

FireMon FortyCloud

Verdict: A powerful tool with a clear and important mission that it fulfills well. We make this our Recommended product this month.

SC Magazine Best Buy

GuardiCore Centra

Verdict: This is one of the best tools of its type that we’ve seen. It is comprehensive, reliable and easy to use. We make it our Best Buy.

NNT Change Tracker Generation 7

Verdict: For the change management required for compliance in just about all regulatory requirements, this is a very strong contender.

Allgress Insight Risk Manager

Verdict: Well worth looking at for those with a need for a complete risk management tool.

Tufin Orchestration Suite

Verdict: We would like to see some form of auto discovery beyond what is available currently. Verdict: this one is well worth your time, but be sure that you have everything on your enterprise identified so that the Suite can access it and collect data.

Modulo Risk Manager

Verdict: This is a gold standard of GRC systems. It has all of the bells and whistles that you need and just about nothing that you don’t.


2016 Global Encryption Trends Study

The 2016 Global Encryption Trends Study provides in-depth information about the role of encryption as a part of an overall data protection strategy and how its use results in an improved...

2016 PKI Global Trends Study

This report summarises the findings from a survey of over 1500 practitioners on current trends in PKI, including use of best practices, deployment trends, and how HSMs are used to...

EU Data Protection Regulation: Encryption Should Be Default Option

This document discusses the changes being made to the European data protection landscape and suggests that encryption should be the default choice for protecting data.

The Mimecast Email Security Risk Assessment 2017

Not all email security systems perform the same. Lots of false negatives get let through. Download the report of ESRA tests to see the threats that Mimecast catches and other email...