John Breeden II

John Breeden II is an award-winning journalist and reviewer with over 20 years of experience covering technology. He is the CEO of the Tech Writers Bureau, a group that creates technological thought leadership content for organizations of all sizes.

Review: FireMon clears the clutter for network security policy management

Review: FireMon clears the clutter for network security policy management

A pioneer in the field of network security policy management, FireMon provides full visibility into networks and devices, and overlays that knowledge with the rules, platforms, hardware and programs designed to protect it.

Security software reviews, 2019: Lab tests of today's top tools
Updated

Security software reviews, 2019: Lab tests of today's top tools

We go hands-on with some of the most innovative, useful and, arguably, best security software on the market.

Review: How Awake Security uncovers malicious intent

Review: How Awake Security uncovers malicious intent

This advanced network traffic monitoring platform identifies hidden threats and those that don’t use traditional malware, making it extremely powerful and useful in today’s threat environment.

Review: Barracuda Sentinel protects email where others fail

Review: Barracuda Sentinel protects email where others fail

Email security may be the next big push in cybersecurity. Here's how Barracuda Sentinel fills the gaps left by gateway appliances.

Review: How Aqua secures containers from development to production

Review: How Aqua secures containers from development to production

The Aqua Cloud Native Security Platform uses an inherent advantage of containers, the fact that they are always highly specialized for their jobs, to create a cybersecurity structure based on whitelisting.

Review: Fidelis Deception breathes life into fake assets

Review: Fidelis Deception breathes life into fake assets

Today's skilled hackers know, or at least suspect, that deception is in place and won't blindly follow breadcrumbs to fake assets. To combat this, Fidelis Deception creates realistic, living deception assets.

Review: Bitglass manages the mobility monster

Review: Bitglass manages the mobility monster

The Bitglass platform secures and controls official work-related interactions between a mobile device and company resources without infringing on a user's smartphone or personal applications.

Review: SlashNext is like shooting phish in a barrel

Review: SlashNext is like shooting phish in a barrel

SlashNext is a dedicated platform for combating modern phishing attacks. It does that one thing and it does it very well.

Review: JASK ASOC isn't just another overloaded SIEM

Review: JASK ASOC isn't just another overloaded SIEM

The JASK Autonomous Security Operations Center coordinates various alerts and events into a picture of an ongoing threat or attack — the kinds of techniques that human threat hunters employ, only much faster.

Review: GreatHorn offers a better way to secure enterprise email

Review: GreatHorn offers a better way to secure enterprise email

GreatHorn takes a modern and highly effective approach to protecting enterprise email that goes well beyond the capabilities of legacy mail scanners.

Review: AttackIQ FireDrill watches the watchers

Review: AttackIQ FireDrill watches the watchers

This penetration testing tool is configured to operate from the inside, with the primary goal of identifying flaws, misconfigurations and outright shortcomings in all other cybersecurity defenses.

Review: Continuous cybersecurity monitoring with CyCognito

Review: Continuous cybersecurity monitoring with CyCognito

The CyCognito platform studies networks the same way that hackers do, from the outside with no help or internal bias inserted into the process.

Review: How StackRox protects containers

Review: How StackRox protects containers

StackRox fully integrates with Kubernetes so that it touches all three phases of containerization deployment: the building of the containers, the deployment of them into the cloud infrastructure, and finally the running of those...

Review: ImmuniWeb offers true automated penetration testing

Review: ImmuniWeb offers true automated penetration testing

Its machine speed allows it to scale, while the human penetration testers ensure complete accuracy.

Review: Protecting multi-cloud environments with Threat Stack

Review: Protecting multi-cloud environments with Threat Stack

Because it's intended for use in environments that require constant uptime, Threat Stack simply concentrates on the detection aspect of cybersecurity, alerting admins when suspicious activity is spotted.

Review: Protecting API connections with Forum Sentry

Review: Protecting API connections with Forum Sentry

The Forum Sentry API Security Gateway goes beyond access control and deep into security, monitoring all the connections that it forms between systems and enforcing very granular security policies.

Review: Senzing uncovers relationships hiding within big data

Review: Senzing uncovers relationships hiding within big data

Used to combat fraud or uncover accidental data duplication, Senzing is a powerful yet lightweight tool with an artificial intelligence that is actually extremely smart.

Review: Ping Identity brings identity management to cybersecurity defenses

Review: Ping Identity brings identity management to cybersecurity defenses

Enterprise networks have grown too complex to easily manage all user credentials through something like Active Directory. And letting each individual app handle user logins creates silos that can become a security nightmare. The...

Review: Protecting endpoints with SentinelOne’s all-powerful agents

Review: Protecting endpoints with SentinelOne’s all-powerful agents

Having powerful, protected, and independent agents sitting on endpoints gives SentinelOne a huge advantage against today's increasingly sophisticated attacks.

Review: Using AI to outsmart threats with Vectra Cognito

Review: Using AI to outsmart threats with Vectra Cognito

Part traffic monitoring tool, part IDS, part SIEM, the Vectra Cognito platform defies classification.

Load More