Reviews

A laptop with a virtual overlay of abstract code and a binary skull.
User hands on a laptop keyboard have a digital overlay reflecting data/analytics/tracking.

Cybersecurity  >  Email security threats, such as phishing

How Abnormal Security combats business email compromise

Abnormal Security analyzes work relationships, language patterns to spot compromised accounts and stop them from sending mail.

distributed / decentralized network connections across the globe

Volterra provides protected, distributed clouds for almost any application or network

The Volterra platform still seems a bit like a work in progress, but the core components are there and ready for companies that want to finally start consolidating their cloud and network management tools and devices.

video conferencing / remote work / online meeting

Review: 5 top videoconferencing services put to the test

We compared Zoom, Cisco Webex, Microsoft Teams, GoToMeeting, and Google Meet in real-world tests to see which videoconferencing platforms perform best for business users. Here’s how they stack up.

Network security  >  simplified / centralized / unified

ZeroNorth orchestrates and tames enterprise scanner sprawl

The ZeroNorth platform makes scanners more effective and reduces cybersecurity fatigue by consolidating both scan results and fixes.

mobile connection endpoint protection laptop shield

Review: Ericom Shield extends zero trust to websites with browser isolation

Using Docker containers, Shield allows website content in while keeping malware out.

young man on video conference coronavirus remote communication telecommuting by gcshutter getty ima

How remote access tools can help your businesses adapt to the coronavirus

Coronavirus has created unprecedented challenges for companies and their employees across the globe and remote access tools are helping them meet them.

coding / programming / development / binary code

Review: How ShiftLeft catches vulnerabilities during code development

This combination traffic analysis tool and dynamic application security testing tool works with nearly any language and CI system, is very easy to use, and integrates directly into the development process.

CSO  >  Android antivirus conceptual image

Best Android antivirus? The top 8 tools

There are plenty of antivirus tools for Android. Here's how the top 8 measure up in protection, usability and features.

Chain links secure multiple data stream segments.

Review: Achieving enlightened segmentation with Illumio

While segmentation is a powerful defensive tool, it’s also difficult to manage and can easily break applications that need to communicate with other services or the outside world. The Illumio platform solves many of these headaches.

CSO > breakthrough / penetration testing / sledgehammer breaking through a binary wall

Release the monkey! How Infection Monkey tests network security

This free, open source penetration testing tool uses real attacks and real techniques to try and exploit its way into a network.

security automation robot protects defends from attack intrusion breach

Review: LogicHub expertly automates security

It’s not only highly effective at diagnosing and countering threats, but it does so in a transparent way that is configurable and editable by users.

secure system / network security policy management

Review: SaltStack brings SecOps to network orchestration and automation

SaltStack Enterprise, and its optional SecOps modules, is one of the only platforms available today that can fully manage complex enterprise environments while also protecting them.

Load More