Reviews

green army soldier on a laptop keyboard

Review: Protecting endpoints with SentinelOne’s all-powerful agents

Having powerful, protected, and independent agents sitting on endpoints gives SentinelOne a huge advantage against today's increasingly sophisticated attacks.

eye retina scanner security identity access management

The best IAM software: Rating the top 10 products

Based on feedback from IT professionals, these are the best identity and access management products. Download the free PDF report to see how they rank from 1 to 10.

Password entry

The 6 best password managers

Look to these top password managers for Windows, MacOS, iOS and Android to make your online life easier and more secure.

networking background

Review: Using AI to outsmart threats with Vectra Cognito

Part traffic monitoring tool, part IDS, part SIEM, the Vectra Cognito platform defies classification.

smart city - IoT internet of things - wireless network

Review: Monitoring IT, OT and IoT devices with ForeScout

ForeScout is one of a very few programs that can help to track and manage operational technology and IoT devices alongside of information technology. Everything from lighting controllers to HVAC units can be discovered and managed.

malware attack

Review: Zero tolerance malware and code blocking with Solebit

By shifting malware detection away from signatures and behavior to whether any kind of code exists where it’s not supposed to be, the SoleGATE Security Platform from Solebit has the potential to disrupt both endpoint security and...

bucket with holes breach security vulnerability

Review: Predictively locking down security with Balbix

Balbix may technically be a vulnerability manager, but it does it so much better and also so much more that it breaks the bounds of its category.

risk assessment gauge

Kenna Security takes a data-driven approach to risk analysis

Risk from security threats is relative to each company. Kenna Security leverages company and public data to pinpoint the real risk for each customer.

security audit word cloud

Review: How InSpec 2.0 delivers comprehensive compliance

The InSpec 2.0 platform from Chef tackles compliance head-on, tailored to the specific rules and guidelines that a company wants or needs. It is designed to both make sense of regulatory and technical guidelines and ensure that a...

network security digital internet firewall binary code

Review: Corelight adds security clues to network packet analysis

In the tradition of other great network analysis tools like Bro and Sourcefire, Corelight gives security pros deep insight into data traffic on the systems they defend.

cloud security

What is a CASB? What you need to know before you buy

Cloud access security brokers have come a long way in a few years and can be an effective way to manage authentication and encryption across cloud and on-premise systems.

Security alert for incoming threats.

Review: Seceon soups up standard SIEM

The Open Threat Management Platform essentially acts as both an SIEM and a frontline security appliance. Thrifty firms may want to consider eliminating some of their other cybersecurity programs if they duplicate what the OTM is...

scanning the internet malicious magnifying glass

Review: Gazing through a hacker’s lens with RiskIQ Digital Footprint

Requiring no setup or installation, Digital Footprint scans for vulnerability information from outside the firewall ... just like a potential attacker would.

Phishing trends

Review: Keeping the bad phish out of your network pond with Cofense Triage

The tool is still evolving, but even now represents one of the most advanced defenses against phishing.

cloud computing - data center

Review: Protecting clouds with Cloud Defender from Alert Logic

Cloud Defender is a user-friendly tool that lets local IT staff inspect their cloud deployments to look for evidence of hidden threats or breaches. But it can also be used in a SaaS model, with the cybersecurity team at Alert Logic...

4 open-source Mitre ATT&CK test tools compared

Any of these tools from Endgame, Red Canary, Mitre, and Uber will get your red team and pentesters started with Mitre's ATT&CK framework.

rules procedures manuals programming language

Review: Intellicta brings issue tracking to compliance rules

The Intellicta Platform from TechDemocracy acts like a security information and event management (SIEM) console, but for compliancy issues. It pulls information from a series of network collectors and correlates that data into a...

binary code, magnifying lens, skull and crossbones

Review: Bricata adds threat hunting to traditional IPS/IDS

Bricata offers advanced IPS/IDS protection, but also goes a step farther, adding the ability to launch threat hunts based on events, or simply anomalies.

mousetrap cheese

Review: The enSilo platform traps threats that bypass traditional endpoint defenses

The enSilo platform offers traditional endpoint protection alongside the ability to offer post-infection protection. It can also trap threats, holding them in place and rendering them harmless until a threat hunter can arrive to...

How Contrast Security protects applications from the inside out

Contrast Security has one of the most elegant solutions out there for application security. We can see why it scored 100 percent on the OWASP Security Benchmark.

Load More