Reviews

Unlocked circuit board / security threat

Which vulnerability to fix first? Kenna Security has the answer

Kenna's vulnerability management platform is designed to prioritize the most dangerous vulnerabilities. Here's how it works.

free wifi stumbling surveying 1

8 free Wi-Fi stumbling and surveying tools

Here are 8 free Wi-Fi stumbling and surveying tools to reveal important details about Wi-Fi networks.

hardcore devops fists

How XebiaLabs brings order and efficiency to DevOps projects

DevOps is a hot topic in security these days, and for good reason: Software security flaws are often only discovered after an attacker has exploited them, which can cause huge losses of both data and revenue. Here's a look at how...

fog visibility island

GuardiCore Centra provides visibility, protection through advanced micro segmentation

The GuardiCore Centra solution takes complexity out of micro segmentation by providing visibility into network assets and activity.

thinkstockphotos fence 488873591

How vArmour restores the security perimeter

The vArmour suite of tools is designed, first, to reestablish a software perimeter internally and then to hone the rules and policies that make up that backbone, delving all the way into the realm of micro segmentation.

boxing gloves

ArcSight vs. Splunk? Why you might want both

ArcSight and Splunk are highly-rated products in the SIEM market. But user reviews at IT Central Station suggest that, instead of making an either-or choice, IT security managers might want the combo.

pros & cons

SIEM review: Splunk, ArcSight, LogRhythm and QRadar

Enterprise IT professionals who use these leading security information and event management (SIEM) products identify the most valuable features and the areas needing improvement.

Threat hunting guide to securing the enterprise

Sqrrl ferrets out network traffic anomalies to find hidden threats

Using a threat hunting platform like Sqrrl may take a little bit of a shift in thinking for cybersecurity teams. It’s less like being a beat cop and more like being a consulting detective, but arguably much more effective at catching...

Which privileged identity management tools work best?

Discover what real users think of privileged identity management solutions

7 response

Attivo Networks adds response capabilities to deception deployments

With its Deception and Response Platform, Attivo Networks addresses the main weakness of most deception technology, having to rely on other programs to respond to an attack once revealed by the deception network.

flood breach

ThreatConnect makes order out of threat feed chaos

Dealing with too many threat feeds exemplifies that old proverbial wisdom that too much of a good thing can become a bad thing. That's where ThreatConnect comes in.

cloud security

The best (and worst) features of 7 top cloud security solutions

How Evident.io, Cisco CloudLock, Dome9, Netskope, Skyhigh, CloudPassage and Bitglass stack up, according to enterprise users.

managed security service providers

Dunbar's Cyphon extends physical protection-as-a-service into cyber security

For armored car service Dunbar, protecting its clients' money is more than just building secure physical structures and deploying armored trucks with armed guards. It’s also about protecting the digital infrastructure and cyber assets...

browsers chrome firefox internet explorer safari

How Bitdefender HVI protects virtual browsers

The Bitdefender Hypervisor Introspection (HVI) tool sits below the hypervisor and prevents any of these tactics such as buffer overflows, heap sprays, code injection and API hooking from executing, protecting the virtual browser from...

voice assisted devops4

InfoZen enables pre-deployment patching for DevOps coding

For this review, InfoZen was brought in to create a fully-end-to-end DevOps scanning solution using their InfoZen Cloud and DevOps Practice service. Even within our admittedly tiny test environment, the benefits of the InfoZen toolset...

wrestlers fighting

How Promisec keeps endpoints in compliance

The Promisec Endpoint Management (PEM) software can be installed completely on-premises and gives visibility, advice, and even remediation help for all kinds of threats, unwanted programs and compliance issues that crop up within...

spider web assembly

Acalvio weaves a web of deception on demand

In cyber security, nothing remains static for very long, and already new contenders are emerging with completely different takes on how deception technology should be successfully deployed. We took ShadowPlex from Acalvio for a spin...

network traffic earth

Patrolling network traffic with SecBI

SecBI's new software aims to eliminate two of the problems with using traffic analysis in cybersecurity: volume processing of data for actionable threat intelligence and a reliance on network trapping hardware. Here's how it works.

faceoff face-off hocket

Database security face-off: IBM Guardium vs. Imperva SecureSphere Database Security

Important criteria to consider when evaluating or choosing a database security solution include customization capabilities, reporting features, database discovery, vulnerability management, and database auditing, among others. Here's...

secure container java box circuitry

Container security: How Waratek blocks Java exploits

Waratek's unique approach to container security relies on just-in-time compiling and focuses exclusively on one of the biggest security risks within most organizations: applications running Java.

Load More