pros & cons

SIEM review: Splunk, ArcSight, LogRhythm and QRadar

Enterprise IT professionals who use these leading security information and event management (SIEM) products identify the most valuable features and the areas needing improvement.

Threat hunting guide to securing the enterprise

Sqrrl ferrets out network traffic anomalies to find hidden threats

Using a threat hunting platform like Sqrrl may take a little bit of a shift in thinking for cybersecurity teams. It’s less like being a beat cop and more like being a consulting detective, but arguably much more effective at catching...

Which privileged identity management tools work best?

Discover what real users think of privileged identity management solutions

7 response

Attivo Networks adds response capabilities to deception deployments

With its Deception and Response Platform, Attivo Networks addresses the main weakness of most deception technology, having to rely on other programs to respond to an attack once revealed by the deception network.

flood breach

ThreatConnect makes order out of threat feed chaos

Dealing with too many threat feeds exemplifies that old proverbial wisdom that too much of a good thing can become a bad thing. That's where ThreatConnect comes in.

cloud security

The best (and worst) features of 7 top cloud security solutions

How, Cisco CloudLock, Dome9, Netskope, Skyhigh, CloudPassage and Bitglass stack up, according to enterprise users.

managed security service providers

Dunbar's Cyphon extends physical protection-as-a-service into cyber security

For armored car service Dunbar, protecting its clients' money is more than just building secure physical structures and deploying armored trucks with armed guards. It’s also about protecting the digital infrastructure and cyber assets...

browsers chrome firefox internet explorer safari

How Bitdefender HVI protects virtual browsers

The Bitdefender Hypervisor Introspection (HVI) tool sits below the hypervisor and prevents any of these tactics such as buffer overflows, heap sprays, code injection and API hooking from executing, protecting the virtual browser from...

voice assisted devops4

InfoZen enables pre-deployment patching for DevOps coding

For this review, InfoZen was brought in to create a fully-end-to-end DevOps scanning solution using their InfoZen Cloud and DevOps Practice service. Even within our admittedly tiny test environment, the benefits of the InfoZen toolset...

wrestlers fighting

How Promisec keeps endpoints in compliance

The Promisec Endpoint Management (PEM) software can be installed completely on-premises and gives visibility, advice, and even remediation help for all kinds of threats, unwanted programs and compliance issues that crop up within...

spider web assembly

Acalvio weaves a web of deception on demand

In cyber security, nothing remains static for very long, and already new contenders are emerging with completely different takes on how deception technology should be successfully deployed. We took ShadowPlex from Acalvio for a spin...

network traffic earth

Patrolling network traffic with SecBI

SecBI's new software aims to eliminate two of the problems with using traffic analysis in cybersecurity: volume processing of data for actionable threat intelligence and a reliance on network trapping hardware. Here's how it works.

faceoff face-off hocket

Database security face-off: IBM Guardium vs. Imperva SecureSphere Database Security

Important criteria to consider when evaluating or choosing a database security solution include customization capabilities, reporting features, database discovery, vulnerability management, and database auditing, among others. Here's...

secure container java box circuitry

Container security: How Waratek blocks Java exploits

Waratek's unique approach to container security relies on just-in-time compiling and focuses exclusively on one of the biggest security risks within most organizations: applications running Java.

cloud security

Lacework unmasks hidden attackers amid data center and cloud chaos

Managing even a local data center is a tough job. Keeping a cloud secure is even more difficult. Lacework helps to filter all the chaos, removing false positives, and generating actionable threat intelligence in real-time for IT teams...

Mobile security

SandBlast Mobile simplifies mobile security

Check Point's SandBlast Mobile fits in between mobile device managers and security event log analyzers, and actually makes it easier to manage the overall security footprint of your entire mobile device fleet.

pc antivirus

Review: Minerva protects endpoints with trickery and deception

Minerva's Anti-Evasion Platform targets the new breed of environmentally-aware malware. The idea is that most normal threats will be blocked by traditional antivirus and Minerva will stop anything that attempts to get around that...

network security primary2

RedSeal offers powerful, passive network protection

The RedSeal appliance doesn't actually fix anything on its own, but it does act as a force multiplier for every other security device within a network.

Which enterprise password managers work the best?

This IT Central Station report is based on real users’ feedback on enterprise password managers

green paper glasses with fake black paper mustache

Tested: How 4 deception tools deliver truer network security

Modern deception platforms lay traps that point attackers to fake assets that are created by the deception product. Here's what we discovered about how deception works and the unique features that deception tools from TrapX Security,...

Load More