News
Rene Millman,
Feb 16, 2018
Cyber-attacks on critical infrastructure are now the biggest threat to humanity and more action and collaboration is needed to defeat nation state actors and terrorists threatening essential systems.

Executive Insight

Opinion
Feb 20, 2018
The travel industry needs to act swiftly: the airline sector alone faces estimated losses of €1 billion a year from ticket fraud. It's time to improve fraud prevention and get better at attempts to hack back-end systems.

SC Webcasts

Vendor Webcast

How application security can help you stand out

Many software vendors are now facing questions from customers asking about security practices, which can end up slowing down processes.

x

How application security can help you stand out

Many software vendors are now facing questions from customers asking about security practices, which can end up slowing down processes. While security risks are a constant and ongoing threat, customers want to know they’re doing business with a software vendor that has the skills and tools to address cybersecurity risks in a timely and effective manner. 

Although there are no absolute guarantees in the security space, buyers seek assurance that a software provider has the ability to deliver the best protection possible on a consistent and ongoing basis, that it’s flexible enough to address specific business and industry requirements, and that it can fix problems fast. In this webinar, we look at how to ensure that your software is created securely, with a focus on how this can be used by the go-to-market teams as a competitive differentiator.

  • How to look at your development process in order to impact security
  • How to meet your customer’s software security needs
  • How to assess software components for a holistic security standard
More Info

Sponsored by: Veracode

Vendor Webcast

Masterclass: how to apply security best practices to DevOps

The unprecedented use of open source, speed of continuous integration and continuous delivery, containerisation, and move to the cloud all mean that teams need...

x

Masterclass: how to apply security best practices to DevOps

In the world of DevOps, traditional application security doesn’t cut it anymore, and relying on perimeter defences is a reactionary measure... assuming you control the perimeter. The unprecedented use of open source, speed of continuous integration and continuous delivery, containerisation, and move to the cloud all mean that teams need a new approach to application security. DevOps teams cannot cede speed and agility for the sake of security.

In this webinar, Tim Mackey explores best practices to ensure your DevOps practices stay rugged, lightning fast and secure. Attend and you'll learn:

  • New security challenges facing today’s Continuous Integration (CI) and DevOps practices, including managing open source risks with containers and traditional environments
  • Best practices for designing and incorporating an automated approach to application security into your existing development environment
  • Future development and application security challenges organisations will face and what they can do to prepare
More Info

Sponsored by: Black Duck Software

Director's Cut

Features

PRODUCT REVIEWS

Carbon Black Cb Defense

Verdict: For a mix of threat analysis and incident response – where the core of the alert is malware-based – this one demands your attention. The Carbon Black experience is obvious.

Comodo Advanced Endpoint Protection

Verdict: This is a strong product under the covers but with a few warts for users. None of those are show-stoppers, though, and you would do well to take a close look at it.

SC Magazine Recommended

CrowdStrike Falcon

Verdict: This is a very sophisticated but rather specialised tool for the endpoint. If you are a large organisation or one with high-value information assets, this is well worth your time. For what it does, we know of no better tool available. We make this our cloud-based Recommended product.

SC Magazine Recommended

Cylance CylancePROTECT with CylanceOPTICS

Verdict: If you are using CylancePROTECT this is a no-brainer. If you are not, it’s a good reason to consider it. Because CylancePROTECT is one of our SC Lab Approved products, it already has our highest rating, but we are naming the OPTICS add-on Recommended for the value that it adds ...

SC Magazine Recommended

ESET Endpoint Security

Verdict: If you’re looking for a threat-focused endpoint tool at an attractive price point this is worth your attention. For its ease of use and deployment, we make this our on-premises Recommended tool.

Kaspersky Lab Endpoint Security for Business

Verdict: This is one of the strong players in this field. Although it shows, clearly, a legacy of anti-malware (to the point where it still refers to “anti-virus,” even though it really addresses all malicious software), this tool is a capable contender for endpoint security in general.

SC Magazine Best Buy

McAfee Endpoint Security

Verdict: An exceptional effort on behalf of the McAfee technical support team that provided the SC Lab with the opportunity to dedicate more time to testing the product package. Overall, an excellent product, but you’ll get the most out of it as part of the entire McAfee suite managed, as ours ...

Nyotron PARANOID

Verdict: Don’t pass this one by if you are looking at anti-malware. In our view, it certainly ranks in the top five such products we’ve seen over the past couple of years.

Whitepapers

SC Media eBook on Threat Intelligence

This eBook looks at how you can focus your threat intelligence feeds and tune your network hardware to provide the data you need.

GET SC MEDIA UK DELIVERED TO YOUR INBOX