Reviews

CSO > breakthrough / penetration testing / sledgehammer breaking through a binary wall
security automation robot protects defends from attack intrusion breach

secure system / network security policy management

Review: SaltStack brings SecOps to network orchestration and automation

SaltStack Enterprise, and its optional SecOps modules, is one of the only platforms available today that can fully manage complex enterprise environments while also protecting them.

cloud network assets / cryptocurrency / IoT / disruptive technologies / digital transformation

Review: How Fugue protects cloud assets

The Fugue platform fills a critical need, bringing infrastructure and security compliance protection to the cloud.

Backdoors & Breaches  >  Incident Response Card Game

Backdoors and Breaches incident response card game makes tabletop exercises fun

New Backdoors and Breaches card game makes it easy to build a random, realistic incident as part of a tabletop exercise.

keeping the cloud secure cloud security lock padlock private cloud

Review: How DivvyCloud protects cloud deployments

Keep your cloud instances in compliance throughout their lifecycle — regardless of the type of cloud, the technology or the vendor.

CSO  >  Android antivirus conceptual image

Best Android antivirus? The top 11 tools

There are plenty of antivirus tools for Android. Here's how the top 11 measure up in protection, usability and features.

FireMon network security policy management

Security software reviews, 2019: Lab tests of today's top tools

We go hands-on with some of the most innovative, useful and, arguably, best security software on the market.

boxes box idea outside the box it as a product surprise unique masterzphotois getty

Review: How NeuVector protects containers throughout their lifecycle

Most traditional security products have very little visibility into containers running in the cloud. NeuVector protects containers from within the containerized environment.

A business man touches a futuristic lock + circuit board security interface.

Review: How CybeReady delivers targeted, timely security awareness training

Users will always be the last line of defense for email-based attacks. The CybeReady platform effectively trains them to spot phishing and other dangers, unobtrusively and as-needed.

Cybersecurity  >  Email security threats, such as phishing

Review: How Avanan defends cloud-based email platforms

Avanan can catch the advanced threats that Microsoft, Google or other cloud-based email providers miss, identifying dangers like phishing, malware, data leakage and even full account takeovers.

CSO  >  danger / security threat / malware / biohazard symbol in data center

Review: Morphisec scrambles memory to thwart advanced attacks

With Morphisec, you get a full spectrum of protection that is more complete than any antivirus program alone.

orange monitors with lock icon network security cyber threat

Review: A fully autonomous cybersecurity platform? Cynet 360 comes close

The secret to the platform’s success is the deployment of fully autonomous agents that act as both sensors and threat remediators and are capable of taking actions on their own.

Blue Hexagon network security

Review: Blue Hexagon may make you rethink perimeter security

This fully functional, fully trained cybersecurity tool is ready on day 1 to spot threats on whatever network it’s charged with protecting.

network security / network traffic scanning

3 leading network access control products reviewed

Real IT users evaluate network access control solutions: Cisco Identity Services Engine, Aruba ClearPass and ForeScout CounterACT. (Download the 27-page comparison.)

Load More