Reviews

young man on video conference coronavirus remote communication telecommuting by gcshutter getty ima
coding / programming / development / binary code

CSO  >  Android antivirus conceptual image

Best Android antivirus? The top 8 tools

There are plenty of antivirus tools for Android. Here's how the top 8 measure up in protection, usability and features.

Chain links secure multiple data stream segments.

Review: Achieving enlightened segmentation with Illumio

While segmentation is a powerful defensive tool, it’s also difficult to manage and can easily break applications that need to communicate with other services or the outside world. The Illumio platform solves many of these headaches.

CSO > breakthrough / penetration testing / sledgehammer breaking through a binary wall

Release the monkey! How Infection Monkey tests network security

This free, open source penetration testing tool uses real attacks and real techniques to try and exploit its way into a network.

security automation robot protects defends from attack intrusion breach

Review: LogicHub expertly automates security

It’s not only highly effective at diagnosing and countering threats, but it does so in a transparent way that is configurable and editable by users.

secure system / network security policy management

Review: SaltStack brings SecOps to network orchestration and automation

SaltStack Enterprise, and its optional SecOps modules, is one of the only platforms available today that can fully manage complex enterprise environments while also protecting them.

cloud network assets / cryptocurrency / IoT / disruptive technologies / digital transformation

Review: How Fugue protects cloud assets

The Fugue platform fills a critical need, bringing infrastructure and security compliance protection to the cloud.

Backdoors & Breaches  >  Incident Response Card Game

Backdoors and Breaches incident response card game makes tabletop exercises fun

New Backdoors and Breaches card game makes it easy to build a random, realistic incident as part of a tabletop exercise.

keeping the cloud secure cloud security lock padlock private cloud

Review: How DivvyCloud protects cloud deployments

Keep your cloud instances in compliance throughout their lifecycle — regardless of the type of cloud, the technology or the vendor.

FireMon network security policy management

Security software reviews, 2019: Lab tests of today's top tools

We go hands-on with some of the most innovative, useful and, arguably, best security software on the market.

boxes box idea outside the box it as a product surprise unique masterzphotois getty

Review: How NeuVector protects containers throughout their lifecycle

Most traditional security products have very little visibility into containers running in the cloud. NeuVector protects containers from within the containerized environment.

A business man touches a futuristic lock + circuit board security interface.

Review: How CybeReady delivers targeted, timely security awareness training

Users will always be the last line of defense for email-based attacks. The CybeReady platform effectively trains them to spot phishing and other dangers, unobtrusively and as-needed.

Cybersecurity  >  Email security threats, such as phishing

Review: How Avanan defends cloud-based email platforms

Avanan can catch the advanced threats that Microsoft, Google or other cloud-based email providers miss, identifying dangers like phishing, malware, data leakage and even full account takeovers.

CSO  >  danger / security threat / malware / biohazard symbol in data center / servers

Review: Morphisec scrambles memory to thwart advanced attacks

With Morphisec, you get a full spectrum of protection that is more complete than any antivirus program alone.

Load More
You Might Also Like