Reviews

network security digital internet firewall binary code

Review: Corelight adds security clues to network packet analysis

In the tradition of other great network analysis tools like Bro and Sourcefire, Corelight gives security pros deep insight into data traffic on the systems they defend.

cloud security

What is a CASB? What you need to know before you buy

Cloud access security brokers have come a long way in a few years and can be an effective way to manage authentication and encryption across cloud and on-premise systems.

Security alert for incoming threats.

Review: Seceon soups up standard SIEM

The Open Threat Management Platform essentially acts as both an SIEM and a frontline security appliance. Thrifty firms may want to consider eliminating some of their other cybersecurity programs if they duplicate what the OTM is...

scanning the internet malicious magnifying glass

Review: Gazing through a hacker’s lens with RiskIQ Digital Footprint

Requiring no setup or installation, Digital Footprint scans for vulnerability information from outside the firewall ... just like a potential attacker would.

Phishing trends

Review: Keeping the bad phish out of your network pond with Cofense Triage

The tool is still evolving, but even now represents one of the most advanced defenses against phishing.

cloud computing - data center

Review: Protecting clouds with Cloud Defender from Alert Logic

Cloud Defender is a user-friendly tool that lets local IT staff inspect their cloud deployments to look for evidence of hidden threats or breaches. But it can also be used in a SaaS model, with the cybersecurity team at Alert Logic...

cyber attack

4 open-source Mitre ATT&CK test tools compared

Any of these tools from Endgame, Red Canary, Mitre, and Uber will get your red team and pentesters started with Mitre's ATT&CK framework.

rules procedures manuals programming language

Review: Intellicta brings issue tracking to compliance rules

The Intellicta Platform from TechDemocracy acts like a security information and event management (SIEM) console, but for compliancy issues. It pulls information from a series of network collectors and correlates that data into a...

binary code, magnifying lens, skull and crossbones

Review: Bricata adds threat hunting to traditional IPS/IDS

Bricata offers advanced IPS/IDS protection, but also goes a step farther, adding the ability to launch threat hunts based on events, or simply anomalies.

mousetrap cheese

Review: The enSilo platform traps threats that bypass traditional endpoint defenses

The enSilo platform offers traditional endpoint protection alongside the ability to offer post-infection protection. It can also trap threats, holding them in place and rendering them harmless until a threat hunter can arrive to...

How Contrast Security protects applications from the inside out

Contrast Security has one of the most elegant solutions out there for application security. We can see why it scored 100 percent on the OWASP Security Benchmark.

man whispering

Ask me anything: Insight Engines lets you talk your network into revealing threats

Think of the Insight Engines tool as Google for network security, allowing natural language searches and returning honed information to answer each query. This comparison doesn't do the program justice, but is a good starting point...

security automation robot protects defends from attack intrusion breach

Review: BluVector enables machines to protect themselves

With machine learning that gets smarter and more network-aware over time, BluVector can tip the scales back in favor of defenders.

Threat hunting guide to securing the enterprise

Review: Mantix4 provides threat hunting as a service

Mantix4 provides robust threat hunting tools for use by clients, but it also takes threat hunting into the software as a service (SaaS) realm, employing a team of experts to hunt on the client's behalf.

black white hat

Hackers are good, not bad

From now on, 'hackers' should refer to white hats instead of black hats.

endpoint protection

Review: Digital Guardian offers ready-to-deploy endpoint security

Advanced threats are increasingly assaulting endpoints. Here's how the Digital Guardian Threat Aware Data Protection Platform tackles the problem.

network security primary2

How 3 innovative products approach network security

The network security category is constantly evolving with the emergence of new threats and attack techniques. Here's how 3 network security products tackle the problem.

phishing hack scam malware binary code

GreatHorn detects the most carefully planned email attacks

Its ability to unmask phishing and social engineering attacks based on context truly sets it apart.

firewall

Calling Barracuda's WAF a firewall is seriously selling it short

The Barracuda Web Application Firewall (WAF) is more than a firewall, it's like the core of an independent bastion of cybersecurity, able to inspect both inbound and outgoing traffic.

binary monitor tech digital moody hacker threat

How NSS Labs' CAWS finds and fixes network threats

The public instance of the CAWS Continuous Security Validation Platform from NSS Labs is a valuable tool for alerting IT teams about real threats with the ability to breach their defenses. But for networks with high security needs,...

Load More