AlienVault Unified Security Management AVUSM v4.1

starstarstarstarstar
AlienVault’s Unified Security Management (AV-USM) platform combines open source technologies for asset discovery/inventory, vulnerability assessment, threat detection, behavioral monitoring and security intelligence/event correlation.

BlackStratus LOG Storm v4.2.0.45

starstarstarstar¾
LOG Storm combines log management and security information management with correlation technology, real-time monitoring and an integrated incident response system.

CorreLog Enterprise Server v5.2.0

starstarstarstar½
CorreLog Enterprise Server combines real-time log management with correlation, auto-learning functions, high-speed search, ticketing and reporting services.

eIQnetworks SecureVue v3.6.3

starstarstarstarstar
SecureVue provides all of the elements one would expect in a SIEM.

EventTracker Enterprise v7.3

starstarstarstarstar
EventTracker Enterprise is comprehensive. It is designed to be scalable to address multiple locations, business units and domains using the EventTracker Stand-Alone, Collection Point and Collection Master architecture.

GFI EventsManager 2013

starstarstarstarstar
GFI EventsManager collects, centralizes, normalizes, consolidates and analyzes a wide range of log types.

HP ArcSight Express

starstarstarstar¾
The HP ArcSight Express appliance features a full set of SIEM capabilities.

LogRhythm

starstarstarstarstar
The LogRhythm appliance goes way beyond traditional security event monitoring and management.

McAfee Enterprise Security Manager

starstarstarstarstar
The Enterprise Security Manager is the ultimate high-powered SIEM.

NetIQ Sentinel

starstarstarstar¾
Sentinel from NetIQ offers a lot of robust SIEM features and functions.

SolarWinds Log Event Manager

starstarstarstarstar
The SolarWinds Log & Event Manager is a virtual appliance capable of collecting logs and events from almost any network-connected device and then correlating that data for further analysis.

Zoho ManageEngine EventLog Analyzer

starstarstarstarstar
The ManageEngine EventLog Analyzer from Zoho is a small application that provides a lot of functionality.

Check Point Threat Prevention Appliance 4809

starstarstarstarstar
The Threat Prevention Appliance from Check Point provides full-scale threat protection at the perimeter, as well as incorporating with endpoint security applications to provide a comprehensive security infrastructure.

Cyberoam Technologies CR2500iNG

starstarstarstarstar
The CR2500iNG unified threat management appliance from Cyberoam offers a multitude of security and threat prevention features for the network perimeter.

Dell SonicWALL NSA E8510

starstarstarstar¾
The NSA E8510 from Dell SonicWALL is a monster security appliance designed for the large enterprise environment.

eSoft InstaGate 604

starstarstarstarstar
This product offers a stateful firewall with deep packet inspection capabilities, proxy-based scanning, real-time threat monitoring, scanning of both web and email for worms and viruses, and protection from bots and other network attacks.

Fortinet FortiGate60C POE

starstarstarstarstar
This product can protect the perimeter of the network with a firewall, intrusion prevention system and IPsec and SSL VPN.

gateprotect GPZ5000

starstarstarstarstar
This product features a full firewall with intrusion detection and prevention system; anti-malware at the gateway, including protection from viruses, worms and spyware; spam protection; web and URL content management; and application control.

Kerio Technologies Kerio Control v7.4

starstarstarstarstar
Kerio Control provides a clear, snappy interface for administration.

NETGEAR ProSecure UTM25S

starstarstarstar¾
Unified threat management solutions shouldn’t be limited to large corporations with unlimited budgets. NETGEAR agrees, and offers their ProSecure UTM25S at a price point that should be attractive to small businesses.

Sophos UTM 220

starstarstarstarstar
Targeting small to midsized offices with up to 150 users, it combines standard UTM offerings with a few features we didn't expect, making this product something definitely worth looking at.

VASCO Data Security aXsGUARD Gatekeeper

starstarstarstar½
Administrators of smaller environments on a fixed budget could do very well by the aXsGUARD Gatekeeper by VASCO Data Security. While a little more complicated to use than some of the more expensive products, with a little attention to detail the device performs well.

WatchGuard XTM 830

starstarstarstarstar
WatchGuard XTM 830, though somewhat pricey, provides an excellent enterprise-grade perimeter defense against viruses, spam and other unwelcome traffic.

Wedge Networks 1005G AntiMalware Gateway

starstarstarstar
The Wedge Networks 1005G looks good on paper, but in reality is a little disappointing. While the initial setup was easy enough, ease-of-use issues and documentation gaps made for a frustrating deployment experience.

Reflex VMC Virtualization Management Center

VMC takes advantage of the nature of a virtual data center.

Bitdefender GravityZone

GravityZone lets users bounce between various computing environments: physical, virtualized and mobile.

McAfee MOVE Anti Virus

McAfee has successfully brought together the application of a centralized policy engine – ePO – with its anti-malware capability in the physical world.

Symantec Critical System Protection CSP

One might characterize CSP as a security wrapper for mission-critical environments.

BeyondTrust Retina CS

starstarstarstarstar
The Retina CS from BeyondTrust offers up quite a few strong features for vulnerability management throughout the enterprise.

Core Impact Professional

starstarstarstarstar
We found this version of Core Impact Professional to contain more automation, more wizards and more options than previous versions we have tested.

Critical Watch FusionVM

starstarstarstar½
FusionVM from Critical Watch offers both vulnerability management and configuration policy auditing in either a physical or virtual appliance or as a full, cloud-based SaaS option

GFI LanGuard 2012

starstarstarstarstar
This product brings together vulnerability scanning, remediation and patch management, and network and software auditing all under one easy-to-use product.

netVigilance Internal Scan Cloud

starstarstarstarstar
Internal Scan - Cloud edition from netVigilance offers a full cloud-based vulnerability scanning engine that can scan both internal and external systems for vulnerabilities and compliance.

QualysGuard Vulnerability Management v7.6

starstarstarstarstar
The QualysGuard Vulnerability Management (VM) solution provides automated auditing and vulnerability management for small to large enterprises.

Rapid7 Nexpose v5.5

starstarstarstarstar
Nexpose assists clients through the entire vulnerability management lifecycle – from discovery, vulnerability detection, risk classification, impact analysis, reporting, vulnerability verification and risk mitigation.

SAINTmanager/SAINTscanner/SAINTexploit v7.14

starstarstarstar¾
From the same graphical user interface, SAINT provides an integrated solution for vulnerability scanning, configuration compliance testing, penetration testing, canned reporting and custom report creation.

Secunia VIM v4.0

starstarstarstarstar
The Secunia VIM is a real-time vulnerability intelligence and management tool, providing organizations with the necessary information required to analyze vulnerabilities in their IT infrastructure, as well as track them from a centralized dashboard interface.

Tenable SecurityCenter Continuous View v4.6

starstarstarstarstar
Tenable SecurityCenter Continuous View (SC-CV) provides real-time vulnerability management, capturing security and compliance risks introduced by mobile, cloud and virtual infrastructure.

ZOHO ManageEngine Security Manager Plus v5.5 Build 5506

starstarstarstar½
Security Manager Plus (Professional Edition) is a network security scanner that proactively reports on network vulnerabilities and helps to remediate them and ensure compliance.

Deepnet Security DualShield

starstarstarstarstar
With its DualShield, Deepnet Security offers a product that can add that extra layer of security to those applications – at a reasonable price point.

DigitalPersona Pro Enterprise

starstarstarstar¾
As long as one is using Active Directory, DigitalPersona Pro Enterprise may just be the solution for large-scale deployment of multifactor authentication services.

Entrust IdentityGuard

starstarstarstarstar
With its IdentityGuard product, Entrust integrates physical and logical, mobile and cloud security, all at a surprisingly low price point.

PhoneFactor

starstarstarstar¾
Companies looking for a turn-key, out-of-band authentication solution need look no further than PhoneFactor.

SafeNet Authentication Service

starstarstarstarstar
The SafeNet Authentication Service offers an entirely cloud-based multifactor authentication platform for the enterprise.

SecureAuth IdP

starstarstarstarstar

Swivel Secure Swivel Appliance

starstarstarstar½
The Swivel Appliance from Swivel Secure is driven by PINsafe, which allows users to combine PINs with randomly generated security strings to provide robust strong authentication.

VASCO DIGIPASS GO 7 and IDENTIKEY Authentication Server

starstarstarstarstar
The IDENTIKEY Authentication Server and DIGIPASS GO 7 from VASCO pair together to provide solid, out-of-the-box, strong authentication to applications throughout the enterprise environment.

TeleSign 2FA

starstarstarstar¾
TeleSign 2FA is a full application programming interface (API) and software development kit (SDK) that allows an enterprise to integrate two-factor authentication into its existing web applications.

Application Security DbProtect

starstarstarstar¼
Focusing solely on database security, DbProtect from Application Security is an affordable database security product which, given the right environment, could be very beneficial to administrators.

Barracuda Networks Barracuda Web Application Firewall 460

starstarstarstarstar
The Barracuda Web Application Firewall provides affordable security without skimping on features or breaking the bank.

Bayshore Networks SingleKey

starstarstarstar½
SingleKey from Bayshore Networks is a full-featured application firewall that provides solid protection from malicious attacks to enterprise applications.

F5 Networks BIGIP Application Security Manager

starstarstarstarstar
The BIG-IP Application Security Manager (ASM) functions as an application firewall, protecting web applications and services with a powerful policy engine.

Fortinet FortiDB400c

starstarstarstarstar
Given the importance of the data contained within any corporation’s databases, the task of keeping that data safe should be a top priority for any IT security team. Fortinet’s FortiDB-400c is dedicated to helping security professionals do precisely that.

Imperva SecureSphere Business Security Suite

starstarstarstar½
With what may just be the Cadillac of application and database security products, Imperva makes its appearance to help hold attackers at bay.

McAfee Database Activity Monitoring

starstarstarstarstar
Database Activity Monitoring from McAfee provides both threat protection as well as database auditing for compliance needs

Avatier Identity and Access Risk Management Suite v9.0

starstarstarstar½
Avatier’s Identity and Access Risk Management Suite provides user creation, authentication, provisioning, and deprovisioning of user IDs.

Bradford Networks Network Sentry v6.0

starstarstarstarstar
Network Sentry provides centrally managed access to the network, integrates with user management applications, such as Microsoft Active Directory, and may use agents or remain agentless.

Centrify Suite 2012

starstarstarstarstar
Centrify Suite 2012 provides user provisioning and access control across the enterprise.

Code Green Networks CI750 Content Inspection Appliance v8.0

starstarstarstarstar
The CI-750 provides real-time content inspection allowing customers to protect against data loss across the network.

Fischer International Fischer Identity v5.0

starstarstarstarstar
The Fischer solution is postured to help organizations drive (not react to) their identity management solutions.

ForeScout Technologies ForeScout CounterACT v7.0

starstarstarstar¾
ForeScout CounterACT offers an enterprise-class NAC, assuring network access based on real-time endpoint classification configuration assessment, user and endpoint compliance policy and automated response.

Hitachi ID Systems Hitachi ID Management Suite v8.0

starstarstarstar½
The Hitachi ID Management Suite is primarily made up of three modules: Hitachi ID Identity Manager, which helps manage identities and provisioning across multiple systems and applications; Hitachi ID Password Manager; and Hitachi ID Privileged Access Manager.

Lieberman Software Enterprise Random Password Manager

starstarstarstarstar
Lieberman Software really delivered on this. Its Enterprise Random Password Manager (ERPM) addresses the management of privileged access across enterprise resources.

McAfee Cloud Identity Manager

starstarstarstar¾
The Cloud Identity Manager from McAfee helps administrators provide single sign-on and account provisioning for cloud-based applications.

NetIQ Identity Manager

starstarstarstar¾
Identity Manager from NetIQ is a full identity and user management platform that allows administrators to manage users across physical, virtual and cloud-based environments.

NetWrix Identity Management Suite

starstarstarstar½
The NetWrix Identity Management Suite is actually a combination of several NetWrix products that are bundled together and can be installed individually or together as one large suite.

Quest One Identity Manager with ActiveRoles Server

starstarstarstar¾
Quest One Identity Manager with ActiveRoles Server provides a wide array of identity management features and functions.

Softerra Adaxes

starstarstarstar½
Adaxes from Softerra enables the ability to automate user provisioning and deprovisioning by interfacing directly with Microsoft Active Directory.

StillSecure Safe Access

starstarstarstar½
Safe Access from StillSecure offers a full network access control system that includes functionality for ensuring endpoints on the network meet policy and compliance standards before being able to join the network and access network resources.

Thycotic Software Secret Server, Password Reset Server and Group Management Server

starstarstarstar¾
Here we have three products from Thycotic Software that when combined provide a reasonably comprehensive identity management suite.

Axway MailGate SC

starstarstarstarstar
The Axway MailGate SC offers a full set of features for both email content management and security.

Barracuda Spam Virus Firewall

starstarstarstar¼
Using this appliance, administrators can protect their enterprise from both inbound and outbound threats, such as spam, viruses, phishing, spyware and email address spoofing.

Cisco Email Security Appliance

starstarstarstarstar
With this email security and content management tool in place, administrators can protect their environment from spam, viruses and other mail-based malware while managing email content and providing a solid level of data leakage prevention and email control.

Clearswift SECURE Email Gateway

starstarstarstarstar
The SECURE Email Gateway from Clearswift offers up strong features and functions for email security and content management.

DataMotion SecureMail Gateway

starstarstarstar¾
The SecureMail Gateway from DataMotion provides the ability to easily integrate full email encryption into an existing enterprise environment.

Echoworx Encrypted Mail Gateway

starstarstarstar¾
The Encrypted Mail Gateway from Echoworx offers a full cloud-based platform for seamless email encryption throughout the enterprise.

Fortinet FortiMail400C

starstarstarstar¾
The FortiMail-400C, while complicated to set up, offers an incredible feature set at an affordable price.

Halon Security Virtual Spam Prevention VSP

starstarstarstar½
The Halon Virtual Security Appliance from Halon Security is a quick and robust email gateway, but administrators should be prepared to learn a new scripting language in order to fully use the product.

McAfee Email Protection

starstarstarstarstar
This email security and content filtering tool does everything we would expect, with a combination of flexibility and ease of use seldom seen.

TITUS Message Classification

starstarstar½
TITUS Message Classification is a tool with which to classify messages, yes, but email security is not its primary focus.

Trend Micro InterScan Messaging Security

starstarstar
Combining on-premise software with an optional cloud-based pre-filter, the tool provides a flexible approach to email security.

WatchGuard Technologies XCS 570

starstarstarstarstar
Providing content filtering and encryption, the XCS 570 from WatchGuard Technologies allows administrators to easily combat data leakage.

TeleSign Verify PhoneID Standard

If one could get the cost, ease of use and provisioning into a practical range, one could offer multifactor authentication to all users. That is exactly what Telesign does.

Wombat Security Technologies Security Training Platform

Wombat Security Technologies is in the business of threat filtering and user training. For this month, we looked at their training.

EastNets en.SafeWatch AntiFraud

EastNets offers a sophisticated suite of filtering products that, taken together, give financial institutions what they need to combat fraud and money laundering.

NICE Actimize Remote Banking Fraud

NICE Actimize covers most of the online fraud bases, including money laundering, case management, brokerage compliance and overall security. It is a truly high volume data processor.

Easy Solutions Detect Monitoring Service, Detect Safe Browsing, DetectID, DetectTA

This is a suite of products that covers fraud detection (heavily phishing-oriented), browsing protection, multifactor authentication and transaction anomaly detection.

Ping Identity PingOne

Cloud-based federated identity management for “cloud identity management switch.”

Check Point Endpoint Security

starstarstarstar¾
Endpoint Security from Check Point offers up a lot of functionality that can be customized for the needs of the environment.

DeviceLock Endpoint DLP Suite

starstarstarstarstar
The Endpoint DLP Suite from DeviceLock offers full control over devices, peripherals and ports throughout the enterprise.

ESET Endpoint Security

starstarstarstar½
Endpoint Security from ESET focuses on malware prevention and overall system security to mitigate threats throughout the enterprise.

GFI EndPointSecurity 2012

starstarstarstar¾
GFI EndPointSecurity 2012 provides administrators a simple way to lock down computers across the enterprise network to ensure only authorized removable media devices are used to protect against data leaks and potential infection from malware.

Identity Finder DLP Suite

starstarstarstarstar
Administrators can use this product to remotely scan and search remote machines for personal information. It then can remediate possible compliance violations by shredding, redacting, encrypting or quarantining the sensitive data.

McAfee Total Protection for Endpoint

starstarstarstarstar
Total Protection for Endpoint from McAfee offers just what the name says: a full-scale suite of tools to protect and secure endpoints throughout the enterprise and ensure that policy compliance is met across the board.

Novell Endpoint Protection Suite

starstarstarstarstar
The Endpoint Protection Suite can leverage already existing Microsoft Active Directory or Novell eDirectory structures to manage policies based on users or computers, thus offering full integration throughout the environment.

Wave Systems EMBASSY Remote Administration Server

starstarstarstar¼
Administrators can use this product to quickly and easily manage many types of both hardware- and software-based encryption throughout the enterprise.

Arkoon Network Security StormShield v6.x

starstarstarstar
StormShield is designed to enhance endpoint security through user control, system level security, data protection and network connectivity.

Bit9 Parity Suite V6.0.2

starstarstarstar
Bit9 Parity is a policy-driven whitelisting solution for managing the applications and devices that can run on Windows computers.

Sign up for our newsletters

POLL