Reviews

FireMon network security policy management

Security software reviews, 2019: Lab tests of today's top tools

We go hands-on with some of the most innovative, useful and, arguably, best security software on the market.

boxes box idea outside the box it as a product surprise unique masterzphotois getty

Review: How NeuVector protects containers throughout their lifecycle

Most traditional security products have very little visibility into containers running in the cloud. NeuVector protects containers from within the containerized environment.

A business man touches a futuristic lock + circuit board security interface.

Review: How CybeReady delivers targeted, timely security awareness training

Users will always be the last line of defense for email-based attacks. The CybeReady platform effectively trains them to spot phishing and other dangers, unobtrusively and as-needed.

Cybersecurity  >  Email security threats, such as phishing

Review: How Avanan defends cloud-based email platforms

Avanan can catch the advanced threats that Microsoft, Google or other cloud-based email providers miss, identifying dangers like phishing, malware, data leakage and even full account takeovers.

CSO  >  danger / security threat / malware / biohazard symbol in data center / servers

Review: Morphisec scrambles memory to thwart advanced attacks

With Morphisec, you get a full spectrum of protection that is more complete than any antivirus program alone.

orange monitors with lock icon network security cyber threat

Review: A fully autonomous cybersecurity platform? Cynet 360 comes close

The secret to the platform’s success is the deployment of fully autonomous agents that act as both sensors and threat remediators and are capable of taking actions on their own.

Blue Hexagon network security

Review: Blue Hexagon may make you rethink perimeter security

This fully functional, fully trained cybersecurity tool is ready on day 1 to spot threats on whatever network it’s charged with protecting.

network security / network traffic scanning

3 leading network access control products reviewed

Real IT users evaluate network access control solutions: Cisco Identity Services Engine, Aruba ClearPass and ForeScout CounterACT. (Download the 27-page comparison.)

Insider Pro  >  Plug-and-play network security

Review: How Perimeter 81 provides a near plug-and-play network security service

Starting with the concept of zero trust, VPN tunneling and secure network access as a service, Perimeter 81 is now providing an almost plug-and-play solution for more elements of cybersecurity served through the cloud and on demand.

mobile connection endpoint protection laptop shield

Review: How Nyotron Paranoid puts endpoint security worries to rest

Adding an extra layer of endpoint protection isn't just for the overly cautious.

CSO  >  macOS Mojave endpoint security

Reviewing endpoint protection products (and picking the Top 10)

As you add more and more smartphones, laptops, tablets and other wireless devices that need to connect into your network remotely, how do you ensure you're secure? Download this report to evaluate the best options.

cloud security expert casb binary cloud computing cloud security by metamorworks getty

What is a CASB? What you need to know before you buy

Cloud access security brokers have come a long way in a few years and can be an effective way to manage authentication and encryption across cloud and on-premise systems.

CSO > Micsoroft Windows logo emblazoned on a security shield in a field of abstract binary data.

Review: How Barac ETV analyzes encrypted data streams

Barac’s Encrypted Traffic Visibility Platform can halt encrypted attacks — without breaking the encryption. In our tests, the results seemed mostly instantaneous.

login credential - user name, password - administrative controls - access control - single sign-on

Single sign-on solutions: How 9 top tools compare

SSO can reduce the risk of weak passwords and administrative overhead associated with managing account access. These are the top single sign-on solutions to consider.

CSO  >  Searching for vulnerabilities  >  Magnifying lens in a virtual interface idnetifies weakness

Review: XM Cyber HaXM makes automated penetration testing more accessible, reliable

HaXM is the next logical evolution of automated pentesting programs. Not only does it offer continuous scanning that is easy to configure, it also provides advice to help fix problems.

network endpoint connections / synapses

Review: CrowdStrike Falcon breaks the EDR mold

The biggest differentiator with Falcon is that the brains of the platform exist completely in the cloud, which gives it unlimited scalability as well as a massive footprint of users and enterprises.

detection radar computer bug threats identify breach  by the lightwriter kao studio getty

Review: LogRhythm takes SIEM to the next level

LogRhythm Enterprise offers a lot of protection and assistance for finding and remediating threats … and sometimes even pre-threat actions.

FireMon network security policy management

Review: FireMon clears the clutter for network security policy management

A pioneer in the field of network security policy management, FireMon provides full visibility into networks and devices, and overlays that knowledge with the rules, platforms, hardware and programs designed to protect it.

network security / network traffic scanning connected devices

Review: How Awake Security uncovers malicious intent

This advanced network traffic monitoring platform identifies hidden threats and those that don’t use traditional malware, making it extremely powerful and useful in today’s threat environment.

istock 496726041

Review: Barracuda Sentinel protects email where others fail

Email security may be the next big push in cybersecurity. Here's how Barracuda Sentinel fills the gaps left by gateway appliances.

Load More