Network security System, Software and Product ReviewsProduct Subcategories:
WHAT: The T30-W is a UTM for small- to medium-sized organizations. Used with Dimension it provides most of the functionality needed for today’s threatscape.
VENDOR: Intel Security
WHAT: Probably the most comprehensive and powerful SIEM we’ve seen, continuing the legacy of the old Nitro product up to the present time.
PRICE: Starts at $39,995 for the VM software version or $47,994 for the hardware version.
WHAT: Probably the most complete pure-play SIEM we’ve seen with the added benefit of many next-gen features and superlative correlation and analytics.
PRICE: $32,000, plus 20 percent for annual maintenance.
WHAT: Excellent value and wide-ranging capabilities perhaps unexpected in such a modestly priced package.
PRICE: Starts from $5,795 to $12,995.
WHAT: Excellent price point for a very flexible SIEM/log correlator with lots of features.
PRICE: $5,000, software only.
WHAT: Significant, mature next-generation blend of SIEM and UTM capabilities at a very reasonable price. Outstanding customer relationship building.
PRICE: $5,050 for the virtual appliance.
VENDOR: Vectra Networks
WHAT: Spots and analyzes attacks, particularly APTs.
PRICE: $68,000, hardware and software with hardware support $1,600 and software support and upgrades at no additional cost.
WHAT: Deception technology application.
WHAT: Active breach detection.
PRICE: Depends on user count and organization size.
WHAT: Behavioral attack detection.
SC Magazine Articles
- Cerber ransomware strain now targeting Office 365 users
- Critical infrastructure in Europe exposed to hackers
- Deal with the devil: Ransomware experiment proves you can negotiate price down
- WordPress Summer of Pwnage: 64 holes in 21 days
- Cerber ransomware C&C server shut down by research firm and CERT-Netherlands
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- Hard Rock Hotel & Casino Las Vegas hit with POS breach
- X-ray and MRI machines among devices used as springboards for data breach attacks
- Brexit shakeup: How will the U.K.'s exit from the EU affect the technology sector?
- Hacker purportedly selling over 650,000 stolen medical records on dark web marketplace
- WhatsApp in the spotlight after Turkey publishes messages of coup officers
- For the incoming federal CISO: Focus on the human side of cybersecurity
- Audit: FBI's threat prioritization process too subjective and sluggish
- 2.3 million 'Warframe,' 'Clash of Kings' accounts compromised
- MS-ISAC official: Ransomware top priority