Centralizes and de-duplicates security tools, such as anti-malware, in a virtual environment.
Automatically and continuously discovers all assets in the virtual infrastructure, allows the grouping of these assets into logical Catbird Trust Zones.
Virtual system security, specifically for Hyper-V environments.
Cloud security automation through encryption.
Behavior-based machine learning and predictive analytics.
Virtualizes existing management tools using proprietary container technology to encapsulate them in their entirety, and enables them to be centrally managed and automated via a policy engine.
A suite of protection functions for VMware, Citrix and Microsoft virtualized environments.
Prevents impact of malware by isolating all user activity and cleaning any malicious files before presenting to the user.
Secure file sharing and collaboration in the cloud.
The Boldon James Classifier bundle is a comprehensive data leakage prevention solution that is easy to implement in organizations large and small.
Code Green Network’s TrueDLP product is an extremely effective solution to data leak protection.
Identity Finder Sensitive Data Manager takes a robust approach to data leakage prevention, offering maximum security across almost any networked device.
Varonis DatAdvantage and the Data Classification Framework work to identify where any and all of your sensitive and proprietary information lies.
The AlienVault Unified Security Management platform is one of the most unique products we have ever had the pleasure of reviewing.
Check Point Software 1180 Next Generation Threat Prevention Appliance (NGTP) is a unified threat management (UTM) firewall, router, gateway and wireless access point.
The CorreLog SIEM Correlation Server is a flexible solution to strengthening security on a network.
Cyberoam CR1000iNG-XP is a next-generation firewall appliance that includes VPN, email, anti-virus, HTTP and HTTPS and FTP anti-virus, anti-spam and IPS with custom signatures inside the modular appliance.
The Dell SonicWALL NSA 3600, along with its TotalSecure license bundle, is the company’s offering for the UTM gateway and next-generation firewall market.
The EiQ Networks SecureVue software suite is a comprehensive log and asset management system that lets network administrators quickly get the full picture of what is going on in their network.
The EventTracker Security Center v7.6 is a great solution for enterprise security information and event management (SIEM).
LogRhythm is a security information and event manager that is extremely customizable, functional and user friendly.
The EventLog Analyzer from ManageEngine is quickly installed and easily scalable software that can be implemented for a network’s SIEM solution.
Intel Security’s McAfee Enterprise Security Manager (ESM) is a security information and event management suite. It is available as a VM or hardware appliance and supports a massive number of products to produce useful information for security administrators.
The EventSentry from Netikus brings to the table a plethora of functionality to ensure system security.
The NetIQ Sentinel may be one of the best SIEM solutions for your network.
SolarWinds Log & Event Manager is one of the most popular SIEMs on the market today – and with good reason.
The Firebox M440 is the latest next-generation firewall offering from WatchGuard.
The ZyXEL Communications USG1900 is a comprehensive UTM firewall that is brilliantly simple to set up.
DualShield is an enterprise-grade, unified, multifactor authentication platform that protects all commonly used business applications with a large selection of multifactor authentication methods.
DIGIPASS 760 is a trusted hardware device for visual transaction-signing that creates a secure optical communication channel between the end-user (client) and the organization (server).
Entrust IdentityGuard is a dual-factor authentication server, app, smart card manager, biometrics server and general jack-of-all-trades when it comes to dual-factor authentication.
SafeNet Authentication Service is a cloud-based authentication service that uses a wide range of tokens and custom agents to support multifactor authentication to include one-time passwords generated by a phone app, SMS, a hardware token or email.
The Imation IronKey F200 Flash Drive is a simple, easy to set up and extremely secure device for users who need to transport confidential data between computers.
LoginTC from Cyphercor is a cloud-based solution that uses a mobile device or a desktop for authentication. It has easy-to-use iOS, Android and Chrome desktop applications to approve logins to a variety of products.
PortalGuard is a multifactor authentication, web-based single sign-on (SSO) through internet information services (IIS) and self-service password reset server and application rolled into one.
The RSA Authentication Manager is a dual-factor authentication system designed from the ground up for enterprise deployment.
SecureAuth IdP is an identity provider – with a unique approach to securing user access control.
The Swivel Appliance is a competitive solution for two-factor authentication methods for clients searching for a secure product.
The BeyondTrust UVM20 Security Management Appliance is the preconfigured hardware offering of Retina CS Enterprise Vulnerability Management.
Core Security’s Core Insight is the gold standard for penetration testing and vulnerability assessment.
Qualys Express Lite is a cloud-based vulnerability assessment tool intended for small businesses.
Rapid7 Nexpose Ultimate is a comprehensive vulnerability scanner that is determined to convince you of its findings.
The SAINT Security Suite is a robust software package that quickly and easily gives a heads-up view of vulnerabilities on the network.
Secunia Corporate Software Inspector (CSI) inspects software on any Windows or Android device with an agent.
The Skybox Enterprise Suite is an enterprise vulnerability assessment tool that is deployed to aid in vulnerability and threat management, as well as security policy management.
Tenable Network Security Nessus is one of the most comprehensive and widely deployed vulnerability assessment tools.
The Tripwire IP360 appliance is a solution for advanced enterprise threat detection, vulnerability management and risk assessment.
This product collects threat intelligence data from a variety of sources.
Engineers at OpenDNS have developed a suite of tools that they use to manage, monitor and investigate potential cyberthreats, especially those that impact name servers directly. One of those tools is Investigate.
This is a solid, technically oriented open source intelligence service.
This is a general open source intelligence tool with a solid, though not extensive, focus on cyberintelligence.
This is an extremely powerful system for gathering, analyzing and acting on cyberthreat intelligence.
ThreatStream’s OPTIC is a cyberthreat intelligence platform that manages the lifecycle of threat intelligence via integration across an enterprise’s security infrastructure.
This is a very good threat intelligence tool where almost all of the threat sources and analytics are under the covers.
Adds a lot of value to your security stack by applying threat intelligence. Provides a prodigious amount of extremely useful research, much of it from analysts around the globe.
Threat intelligence appliance that ties the Norse DarkMatter infrastructure to your network.
The Barracuda Web Application Firewall is a hardware-based device which is used to monitor, assess and remediate web-based application vulnerabilities.
The FortiDB 1000D is a hardware appliance that monitors, audits and identifies vulnerabilities in databases. There are three deployment options: network sniffer, native audit and network agents.
Sensitive Data Manager ties discovery to business issues making classification easier and more relevant.
This is a clean product with a well thought-out goal and a well-executed solution. It is part of the overall CA suite of access control products with which it integrates smoothly, and it offers dynamic classification and recognition.
Allows users to apply relevant visual and metadata labels.
Provides classification for data, largely in a Microsoft environment, plus mobile environments.
Threat protection centered outside the firewall.
Detects anomalous behavior on websites.
Account takeover detection and prevention.
Provides evidence-based bot and malware detection with high certainty, in real-time, on any browser-based web request.
Besides automating user creation, the Avatier suite of products offers seamless integration with HR software, enables IT departments to set up a web portal for users to reset their passwords, and it can also create workflows so that high-level IT personnel aren’t bogged down with lower-level requests.
The ForeScout CounterACT is a policy-based network access control product that allows for inventory, classification and regulation of endpoints and network devices.
The Forum Systems Sentry API Gateway is a comprehensive application security appliance that allows users to set up robust security over a variety of different protocols and data formats.
The Hexis Cyber Solutions NetBeat NAC is a well-designed network access control solution that can be deployed in minutes.
ERPM can come in one of several ways. In addition to a standard Windows installer package, it can also come as a virtual appliance for VMware or HyperV.
The iNetSec Smart Finder from PFU systems is an excellent network access control system for organizations of any size.
Pleasant Password Server (PPS) is a simple yet effective way for organizations to manage their passwords everywhere.
MailGate is a secure collaboration gateway appliance which combines email security and content management gateway functionality.
The Barracuda Spam Firewall is an integrated hardware and software solution designed to protect the email server from spam, virus, spoofing, phishing and spyware attacks.
EdgeWave ePrism offers a complete suite of email security services.
McAfee Email Gateway protects networks from viruses, undesirable content, spam and other threats.
Safe-T Box is a secure email and data exchange solution comprised of three components offering high levels of security for secure email solutions.
The WatchGuard XCS 580 (Extensible Content Security Appliance) is an easy-to-use, all-inclusive email and web appliance that provides security and privacy of inbound and outbound traffic.
Avira Professional has its own console and is largely an anti-malware product.
DriveLock offers dynamic, configurable access control for mobile drives, such as floppy disk drives, CD-ROM drives and USB memory sticks.
Endpoint Protector v4 comes as a virtual appliance and is intended to provide device control, mobile device management and data leakage protection.
The tool includes an anti-virus module to scan system files, executables, dynamic-link libraries and drivers. It also scans for and removes rootkits.
Invincea provides an additional layer of security at the endpoint by adding in protection for web browsing and document use.
Kaspersky Endpoint Security for Business is an enterprise-grade endpoint security system that addresses malware, mobile device management, endpoint controls, encryption and systems management.
Addresses systems management tasks: device discovery and inventory, software distribution, patch management, software asset management (SAM), security audit and enforcement, service desk, power management and more.
Novell ZENworks Endpoint Security Management v11 hits all of the marks for a full-featured endpoint security product by addressing managing.
Safetica manages and controls data security at the endpoint through its client-server architecture and three major components: Endpoint Client, Management Server and the Safetica Management Console.
Trend Micro Smart Protection Complete v11
Unifies IT operations and security through a single console, server and agent architecture to address IT risk and systems management requirements across the enterprise.
Helps enterprises manage and control endpoint security by combining a small-footprint, anti-virus agent with integrated patch management and mobile device management (MDM) capability.
BES10 provides device management, security and application management for corporate and BYOD (bring your own device) BlackBerry, iOS and Android devices delivered through a single end-to-end platform.
MobileEther by iboss extends device security which marries MDM with web security in one cloud or hybrid-based platform.
The MECS (Mobile Enterprise Compliance and Security) server is a centrally managed enterprise-grade solution designed to extend security functions to corporate and personally-owned mobile devices (iOS, Android).
Sophos Mobile Control is an enterprise mobility management solution which offers mobile device management, mobile application management, mobile email management, mobile content management and mobile security and compliance through an easy-to-handle, web-based user interface.
STREAM Integrated Risk Manager v3.1 from Acuity Risk Management is a risk-driven, compliance-monitoring and reporting solution that can log, track, remediate and report against multiple standards.
Agiliance RiskVision v7.0 provides a holistic view of security and compliance in one integrated enterprise platform that enables companies to move from a reactive threat-driven approach to a proactive, risk-aware posture.
The AlgoSec Security Management Suite is an appliance-based policy management toolset for analyzing routing tables, hit counters, log files and topology information from various firewalls, switches and routers.
Allgress Insight and Risk Manager v5 helps companies aggregate data from security and compliance assessments and technical inputs and turn it into meaningful, actionable risk specific intelligence that can be aligned with the goals of the business
Sign up to our newsletters
SC Magazine Articles
- Samsung devices, including Galaxy S6, vulnerable to remote code execution
- Dridex banking malware spreading through new spam campaign
- More than 440K new Android malware strains found in Q1, study finds
- U.S., China agree to cybersecurity code of conduct
- Suspicious activity on LastPass network, data compromised
- Study: Only 27 percent of flaws found in gov't applications fixed
- Hacking Team hacked; leaked documents confirm sale of software to Sudan and Ethiopia
- Oracle PeopleSoft attack could enable big data breaches
- FireKeepers confirms breach, says about 85,000 cards and other info are at risk
- Plex video sharing customers left at risk after hack attack