LOG Storm combines log management and security information management with correlation technology, real-time monitoring and an integrated incident response system.
EventTracker Enterprise is comprehensive. It is designed to be scalable to address multiple locations, business units and domains using the EventTracker Stand-Alone, Collection Point and Collection Master architecture.
The SolarWinds Log & Event Manager is a virtual appliance capable of collecting logs and events from almost any network-connected device and then correlating that data for further analysis.
The Threat Prevention Appliance from Check Point provides full-scale threat protection at the perimeter, as well as incorporating with endpoint security applications to provide a comprehensive security infrastructure.
The CR2500iNG unified threat management appliance from Cyberoam offers a multitude of security and threat prevention features for the network perimeter.
This product offers a stateful firewall with deep packet inspection capabilities, proxy-based scanning, real-time threat monitoring, scanning of both web and email for worms and viruses, and protection from bots and other network attacks.
This product features a full firewall with intrusion detection and prevention system; anti-malware at the gateway, including protection from viruses, worms and spyware; spam protection; web and URL content management; and application control.
Unified threat management solutions shouldn’t be limited to large corporations with unlimited budgets. NETGEAR agrees, and offers their ProSecure UTM25S at a price point that should be attractive to small businesses.
Targeting small to midsized offices with up to 150 users, it combines standard UTM offerings with a few features we didn't expect, making this product something definitely worth looking at.
Administrators of smaller environments on a fixed budget could do very well by the aXsGUARD Gatekeeper by VASCO Data Security. While a little more complicated to use than some of the more expensive products, with a little attention to detail the device performs well.
WatchGuard XTM 830, though somewhat pricey, provides an excellent enterprise-grade perimeter defense against viruses, spam and other unwelcome traffic.
The Wedge Networks 1005G looks good on paper, but in reality is a little disappointing. While the initial setup was easy enough, ease-of-use issues and documentation gaps made for a frustrating deployment experience.
McAfee has successfully brought together the application of a centralized policy engine – ePO – with its anti-malware capability in the physical world.
FusionVM from Critical Watch offers both vulnerability management and configuration policy auditing in either a physical or virtual appliance or as a full, cloud-based SaaS option
This product brings together vulnerability scanning, remediation and patch management, and network and software auditing all under one easy-to-use product.
Internal Scan - Cloud edition from netVigilance offers a full cloud-based vulnerability scanning engine that can scan both internal and external systems for vulnerabilities and compliance.
From the same graphical user interface, SAINT provides an integrated solution for vulnerability scanning, configuration compliance testing, penetration testing, canned reporting and custom report creation.
The Secunia VIM is a real-time vulnerability intelligence and management tool, providing organizations with the necessary information required to analyze vulnerabilities in their IT infrastructure, as well as track them from a centralized dashboard interface.
Security Manager Plus (Professional Edition) is a network security scanner that proactively reports on network vulnerabilities and helps to remediate them and ensure compliance.
As long as one is using Active Directory, DigitalPersona Pro Enterprise may just be the solution for large-scale deployment of multifactor authentication services.
The Swivel Appliance from Swivel Secure is driven by PINsafe, which allows users to combine PINs with randomly generated security strings to provide robust strong authentication.
The IDENTIKEY Authentication Server and DIGIPASS GO 7 from VASCO pair together to provide solid, out-of-the-box, strong authentication to applications throughout the enterprise environment.
TeleSign 2FA is a full application programming interface (API) and software development kit (SDK) that allows an enterprise to integrate two-factor authentication into its existing web applications.
Focusing solely on database security, DbProtect from Application Security is an affordable database security product which, given the right environment, could be very beneficial to administrators.
SingleKey from Bayshore Networks is a full-featured application firewall that provides solid protection from malicious attacks to enterprise applications.
The BIG-IP Application Security Manager (ASM) functions as an application firewall, protecting web applications and services with a powerful policy engine.
Given the importance of the data contained within any corporation’s databases, the task of keeping that data safe should be a top priority for any IT security team. Fortinet’s FortiDB-400c is dedicated to helping security professionals do precisely that.
Network Sentry provides centrally managed access to the network, integrates with user management applications, such as Microsoft Active Directory, and may use agents or remain agentless.
ForeScout CounterACT offers an enterprise-class NAC, assuring network access based on real-time endpoint classification configuration assessment, user and endpoint compliance policy and automated response.
The Hitachi ID Management Suite is primarily made up of three modules: Hitachi ID Identity Manager, which helps manage identities and provisioning across multiple systems and applications; Hitachi ID Password Manager; and Hitachi ID Privileged Access Manager.
Lieberman Software really delivered on this. Its Enterprise Random Password Manager (ERPM) addresses the management of privileged access across enterprise resources.
Identity Manager from NetIQ is a full identity and user management platform that allows administrators to manage users across physical, virtual and cloud-based environments.
The NetWrix Identity Management Suite is actually a combination of several NetWrix products that are bundled together and can be installed individually or together as one large suite.
Safe Access from StillSecure offers a full network access control system that includes functionality for ensuring endpoints on the network meet policy and compliance standards before being able to join the network and access network resources.
Using this appliance, administrators can protect their enterprise from both inbound and outbound threats, such as spam, viruses, phishing, spyware and email address spoofing.
With this email security and content management tool in place, administrators can protect their environment from spam, viruses and other mail-based malware while managing email content and providing a solid level of data leakage prevention and email control.
The Halon Virtual Security Appliance from Halon Security is a quick and robust email gateway, but administrators should be prepared to learn a new scripting language in order to fully use the product.
If one could get the cost, ease of use and provisioning into a practical range, one could offer multifactor authentication to all users. That is exactly what Telesign does.
EastNets offers a sophisticated suite of filtering products that, taken together, give financial institutions what they need to combat fraud and money laundering.
NICE Actimize covers most of the online fraud bases, including money laundering, case management, brokerage compliance and overall security. It is a truly high volume data processor.
This is a suite of products that covers fraud detection (heavily phishing-oriented), browsing protection, multifactor authentication and transaction anomaly detection.
GFI EndPointSecurity 2012 provides administrators a simple way to lock down computers across the enterprise network to ensure only authorized removable media devices are used to protect against data leaks and potential infection from malware.
Administrators can use this product to remotely scan and search remote machines for personal information. It then can remediate possible compliance violations by shredding, redacting, encrypting or quarantining the sensitive data.
Total Protection for Endpoint from McAfee offers just what the name says: a full-scale suite of tools to protect and secure endpoints throughout the enterprise and ensure that policy compliance is met across the board.
The Endpoint Protection Suite can leverage already existing Microsoft Active Directory or Novell eDirectory structures to manage policies based on users or computers, thus offering full integration throughout the environment.