Reviews

A school of barracuda in the ocean.

Review: SlashNext is like shooting phish in a barrel

SlashNext is a dedicated platform for combating modern phishing attacks. It does that one thing and it does it very well.

9 screen locking device lock down authentication

Power LogOn offers 2FA and networked password management for the enterprise

This authentication tool is simple to set up and use, but the biggest selling point might be workable password management across the enterprise.

security automation robot protects defends from attack intrusion breach

Review: JASK ASOC isn't just another overloaded SIEM

The JASK Autonomous Security Operations Center coordinates various alerts and events into a picture of an ongoing threat or attack — the kinds of techniques that human threat hunters employ, only much faster.

finger on keyboard with email icons floating out of monitor

Review: GreatHorn offers a better way to secure enterprise email

GreatHorn takes a modern and highly effective approach to protecting enterprise email that goes well beyond the capabilities of legacy mail scanners.

binoculars forecast spy privacy hacker watching

Review: AttackIQ FireDrill watches the watchers

This penetration testing tool is configured to operate from the inside, with the primary goal of identifying flaws, misconfigurations and outright shortcomings in all other cybersecurity defenses.

city network monitoring cityscape

Review: Continuous cybersecurity monitoring with CyCognito

The CyCognito platform studies networks the same way that hackers do, from the outside with no help or internal bias inserted into the process.

cloud security

Review: How StackRox protects containers

StackRox fully integrates with Kubernetes so that it touches all three phases of containerization deployment: the building of the containers, the deployment of them into the cloud infrastructure, and finally the running of those...

binary neural network - artificial intelligence - machine learning

Review: ImmuniWeb offers true automated penetration testing

Its machine speed allows it to scale, while the human penetration testers ensure complete accuracy.

Statue of Atlas against a blue sky and large white clouds.

Review: Protecting multi-cloud environments with Threat Stack

Because it's intended for use in environments that require constant uptime, Threat Stack simply concentrates on the detection aspect of cybersecurity, alerting admins when suspicious activity is spotted.

broken web app hacker

Learn to play defense by hacking these broken web apps

OWASP's Broken Web Applications Project makes it easy to learn how to hack web applications--a critical skill for web application developers playing defense, junior penetration testers, and security-curious management.

network of connections / digital matrix

Review: Protecting API connections with Forum Sentry

The Forum Sentry API Security Gateway goes beyond access control and deep into security, monitoring all the connections that it forms between systems and enforcing very granular security policies.

bruce schneier book click here to kill everybody security in the hyper connected world

Bruce Schneier's Click Here to Kill Everybody reveals the looming cybersecurity crisis

Everything is broken, and government and corporations like it that way. But when people start dying because of insecure cyberphysical systems, the overreaction from panicked policymakers could be worse than after 9/11.We need to solve...

abstract networks and connections

Review: Senzing uncovers relationships hiding within big data

Used to combat fraud or uncover accidental data duplication, Senzing is a powerful yet lightweight tool with an artificial intelligence that is actually extremely smart.

login credential - user name, password - administrative controls - access control - single sign-on

Review: Ping Identity brings identity management to cybersecurity defenses

Enterprise networks have grown too complex to easily manage all user credentials through something like Active Directory. And letting each individual app handle user logins creates silos that can become a security nightmare. The...

green army soldier on a laptop keyboard

Review: Protecting endpoints with SentinelOne’s all-powerful agents

Having powerful, protected, and independent agents sitting on endpoints gives SentinelOne a huge advantage against today's increasingly sophisticated attacks.

eye retina scanner security identity access management

The best IAM software: Rating the top 10 products

Based on feedback from IT professionals, these are the best identity and access management products. Download the free PDF report to see how they rank from 1 to 10.

networking background

Review: Using AI to outsmart threats with Vectra Cognito

Part traffic monitoring tool, part IDS, part SIEM, the Vectra Cognito platform defies classification.

smart city - IoT internet of things - wireless network

Review: Monitoring IT, OT and IoT devices with ForeScout

ForeScout is one of a very few programs that can help to track and manage operational technology and IoT devices alongside of information technology. Everything from lighting controllers to HVAC units can be discovered and managed.

malware attack

Review: Zero tolerance malware and code blocking with Solebit

By shifting malware detection away from signatures and behavior to whether any kind of code exists where it’s not supposed to be, the SoleGATE Security Platform from Solebit has the potential to disrupt both endpoint security and...

bucket with holes breach security vulnerability

Review: Predictively locking down security with Balbix

Balbix may technically be a vulnerability manager, but it does it so much better and also so much more that it breaks the bounds of its category.

Load More