Reviews

endpoint protection

Review: Digital Guardian offers ready-to-deploy endpoint security

Advanced threats are increasingly assaulting endpoints. Here's how the Digital Guardian Threat Aware Data Protection Platform tackles the problem.

network security primary2

How 3 innovative products approach network security

The network security category is constantly evolving with the emergence of new threats and attack techniques. Here's how 3 network security products tackle the problem.

phishing hack scam malware binary code

GreatHorn detects the most carefully planned email attacks

Its ability to unmask phishing and social engineering attacks based on context truly sets it apart.

firewall

Calling Barracuda's WAF a firewall is seriously selling it short

The Barracuda Web Application Firewall (WAF) is more than a firewall, it's like the core of an independent bastion of cybersecurity, able to inspect both inbound and outgoing traffic.

binary monitor tech digital moody hacker threat

How NSS Labs' CAWS finds and fixes network threats

The public instance of the CAWS Continuous Security Validation Platform from NSS Labs is a valuable tool for alerting IT teams about real threats with the ability to breach their defenses. But for networks with high security needs,...

pc antivirus

Bay Dynamics Risk Fabric puts vulnerabilities in context

Many vulnerability management programs will direct IT teams to the critical threat on the non-critical asset, and place a midlevel threat on a critical asset thousands of places down on the priority scale. It’s not the program’s...

cyber attack virus meltdown

Crossbow offers live fire cybersecurity vulnerability testing

The vulnerability assessment platform is one of the most realistic tools, but also one of the most dangerous, that CSO has ever reviewed. All of the attacks that it can load or create are real, using actual techniques and tactics...

Unlocked circuit board / security threat

Which vulnerability to fix first? Kenna Security has the answer

Kenna's vulnerability management platform is designed to prioritize the most dangerous vulnerabilities. Here's how it works.

free wifi stumbling surveying 1

8 free Wi-Fi stumbling and surveying tools

Here are 8 free Wi-Fi stumbling and surveying tools to reveal important details about Wi-Fi networks.

hardcore devops fists

How XebiaLabs brings order and efficiency to DevOps projects

DevOps is a hot topic in security these days, and for good reason: Software security flaws are often only discovered after an attacker has exploited them, which can cause huge losses of both data and revenue. Here's a look at how...

fog visibility island

GuardiCore Centra provides visibility, protection through advanced micro segmentation

The GuardiCore Centra solution takes complexity out of micro segmentation by providing visibility into network assets and activity.

thinkstockphotos fence 488873591

How vArmour restores the security perimeter

The vArmour suite of tools is designed, first, to reestablish a software perimeter internally and then to hone the rules and policies that make up that backbone, delving all the way into the realm of micro segmentation.

boxing gloves

ArcSight vs. Splunk? Why you might want both

ArcSight and Splunk are highly-rated products in the SIEM market. But user reviews at IT Central Station suggest that, instead of making an either-or choice, IT security managers might want the combo.

pros & cons

SIEM review: Splunk, ArcSight, LogRhythm and QRadar

Enterprise IT professionals who use these leading security information and event management (SIEM) products identify the most valuable features and the areas needing improvement.

Threat hunting guide to securing the enterprise

Sqrrl ferrets out network traffic anomalies to find hidden threats

Using a threat hunting platform like Sqrrl may take a little bit of a shift in thinking for cybersecurity teams. It’s less like being a beat cop and more like being a consulting detective, but arguably much more effective at catching...

Which privileged identity management tools work best?

Discover what real users think of privileged identity management solutions

7 response

Attivo Networks adds response capabilities to deception deployments

With its Deception and Response Platform, Attivo Networks addresses the main weakness of most deception technology, having to rely on other programs to respond to an attack once revealed by the deception network.

flood breach

ThreatConnect makes order out of threat feed chaos

Dealing with too many threat feeds exemplifies that old proverbial wisdom that too much of a good thing can become a bad thing. That's where ThreatConnect comes in.

cloud security

The best (and worst) features of 7 top cloud security solutions

How Evident.io, Cisco CloudLock, Dome9, Netskope, Skyhigh, CloudPassage and Bitglass stack up, according to enterprise users.

managed security service providers

Dunbar's Cyphon extends physical protection-as-a-service into cyber security

For armored car service Dunbar, protecting its clients' money is more than just building secure physical structures and deploying armored trucks with armed guards. It’s also about protecting the digital infrastructure and cyber assets...

Load More