BlackBerry Enterprise Service 10

starstarstarstarstar
BES10 provides device management, security and application management for corporate and BYOD (bring your own device) BlackBerry, iOS and Android devices delivered through a single end-to-end platform.

MobileEther v2.0 by iboss

starstarstarstarstar
MobileEther by iboss extends device security which marries MDM with web security in one cloud or hybrid-based platform.

MECS Server v1.9.4.2 by Mobile Active Defense

starstarstarstarstar
The MECS (Mobile Enterprise Compliance and Security) server is a centrally managed enterprise-grade solution designed to extend security functions to corporate and personally-owned mobile devices (iOS, Android).

Sophos Mobile Control v4.0

starstarstarstarstar
Sophos Mobile Control is an enterprise mobility management solution which offers mobile device management, mobile application management, mobile email management, mobile content management and mobile security and compliance through an easy-to-handle, web-based user interface.

Acuity STREAM Integrated Risk Manager v3.1

starstarstarstar½
STREAM Integrated Risk Manager v3.1 from Acuity Risk Management is a risk-driven, compliance-monitoring and reporting solution that can log, track, remediate and report against multiple standards.

Agiliance RiskVision v7.0 HF1

starstarstarstarstar
Agiliance RiskVision v7.0 provides a holistic view of security and compliance in one integrated enterprise platform that enables companies to move from a reactive threat-driven approach to a proactive, risk-aware posture.

AlgoSec Security Management Suite v6.5

starstarstarstarstar
The AlgoSec Security Management Suite is an appliance-based policy management toolset for analyzing routing tables, hit counters, log files and topology information from various firewalls, switches and routers.

Allgress Insight and Risk Manager v5

starstarstarstarstar
Allgress Insight and Risk Manager v5 helps companies aggregate data from security and compliance assessments and technical inputs and turn it into meaningful, actionable risk specific intelligence that can be aligned with the goals of the business

Risk Analytics as a Service v4.1.0

starstarstarstar
Brinqa Risk Analytics is an IT risk management and vulnerability risk management platform that provides a consolidated view of an organization’s risk factors. Handles Big Data very well, reporting, dashboarding and analytics.

Citicus ONE vR.4.0

starstarstarstarstar
Citicus ONE is an integrated system for organizations to automate their IT governance, risk and compliance management processes.

Aegify vMarch2014

starstarstarstarstar
Aegify from eGestalt Technologies is a subscription-based, cloud-delivered software-as-a-service (SaaS) solution for IT security monitoring and compliance management, vulnerability analysis and risk management.

FireMon Security Intelligence Platform

starstarstarstar½
The FireMon Security Intelligence Platform consists of a central security manager appliance fed via data collectors spread throughout the network.

Total Protection ToPS for Compliance v7.x

starstarstarstarstar
ToPS for Compliance and ePolicy Orchestrator (ePO) software is an extensible management platform that enables centralized policy management and enforcement of security products and the systems where they are installed.

Modulo Risk Manager v8.4

starstarstarstarstar
Modulo Risk Manager automates GRC processes, integrating different areas and activities and allowing for centralized reporting.

New Net Technologies Change Tracker Enterprise

starstarstarstarstar
Change Tracker Enterprise from New Net Technologies enables organizations to bring their existing environment into a state of policy compliance and then continually monitor and report on changes made once compliant.

Netwrix Auditor for Active Directory

starstarstarstar
Netwrix Auditor for Active Directory is a small piece of the much larger Netwrix Auditor Suite, which provides change and configuration auditing across a vast array of enterprise systems.

RSA Archer GRC Platform 5.4 SP1

starstarstarstar½
The RSA Archer GRC Platform 5.4 SP1 provides an organization with a consolidated view of its risk.

Rsam GRC Platform v 8.2

starstarstarstarstar
Rsam GRC v8.2 is a platform for risk management and security risk intelligence enabling organizations to perform risk assessments, manage compliance, threats and vulnerabilities, policies, remediation activities, issues, incidents and more.

Skybox View Enterprise Suite v7.0

starstarstarstar¾
Skybox Risk Control is part of Skybox View, a complete portfolio of proactive security risk management solutions that automatically find, prioritize risks and drive remediation in a large or complex network before an adverse event occurs.

TrustedAgent GRC V5.0.4

starstarstarstar½
TrustedAgent GRC v5.0.4 is an IT risk and governance tool modeled after the NIST 800-37 risk management framework – with two added steps that include define, categorize, plan, implement, assess, manage, authorize and monitor.

SolarWinds Network Configuration Manager

starstarstarstarstar
Network Configuration Manager from SolarWinds is a powerful tool for managing policy compliance across many network devices including routers, switches and firewalls.

Titania Nipper Studio

starstarstarstar
Nipper Studio from Titania is a newcomer this year to our policy management review.

Tripwire Enterprise and Tripwire DataMart

starstarstarstarstar
Tripwire Enterprise is a full-scale configuration management product that allows administrators to create master “known and trusted” configuration states for many types of systems and devices on the network.

Tufin Orchestration Suite

starstarstarstarstar
The Tufin Orchestration Suite feature three modules for managing security and compliance policies on network devices, such as routers, switches and firewalls.

Viewfinity Application Control

starstarstarstar½
Application Control from Viewfinity offers full-scale application policy that can be deployed right from a group policy within Active Directory.

Incapsula Enterprise

By proxying all users to a site via a secure content delivery system most, if not all, of the risks are virtually eliminated by this tool.

nCryptedCloud

nCryptedCloud adds a layer of encryption between the user and the storage provider.

Zscaler Security Cloud

This service forces users through the cloud instead of via direct access to an organization’s internet portal.

Promisec Endpoint Manager

starstarstarstar¼
Promisec Endpoint Manager offers full agentless management and auditing of the many client computers on the enterprise network.

AccessData Tool Suite

starstarstarstarstar
We are reviewing this suite of forensic tools as a package the same way we did last year because the elements work well together and offer a complete set of computer forensic capabilities.

Cellebrite UFED Series of Tools

starstarstarstarstar
Cellebrite is, arguably, the number one mobile device forensic tool suite available.

CRU Ditto Forensic FieldStation

starstarstarstarstar
Everything that one needs is in the case, including cables, adapters, a power brick and a space for extra disks.

EnCase Forensic

starstarstarstarstar
EnCase Forensic v7 is the latest incarnation of the EnCase computer forensic tradition.

Lima Digital Forensic Case Management Standard

starstarstarstarstar
The only pure digital forensic case management tool of which we are aware.

NIKSUN Alpine

starstarstarstarstar
This is a general purpose network forensic tool with a solid history.

ADF TriageG2, Responder, Examiner

starstarstarstarstar
These three products are approximately the same type of tool, but with different functionalities depending on the market in which they are used.

AlienVault Unified Security Management v4.4

starstarstarstar½
AlienVault’s Unified Security Management product is an excellent introductory SIEM appliance.

BlackStratus LOG Storm v4.3.0.86

starstarstarstarstar
LOG Storm from BlackStratus combines log management and correlation systems with real-time monitoring and an integrated incident response system all on one easy-to-deploy and use appliance.

CorreLog Server v5.4.0

starstarstarstarstar
System administrators looking to extend their logging capabilities, or security professionals needing to gain deeper insights into their computing environments, might start their search with the CorreLog Server.

EiQ Networks SecureVue v3.6.6

starstarstarstarstar
SecureVue from EiQ Networks provides log gathering, correlation and analysis services for numerous operating systems, network and security devices, combining these services into a solid SIEM platform that offers vulnerability and compliance monitoring, incident management and configuration auditing in one easy-to-use package.

EventTracker Enterprise v7.5

starstarstarstarstar
This feature-rich tool is designed to meet the needs of organizations of all sizes. It hits all the marks for an enterprise SIEM.

HP ArcSight ESM v6.5c

starstarstarstarstar
HP’s ArcSight ESM is a mature product that collects events from virtually any source.

LogRhythm v6.2

starstarstarstarstar
Combining SIEM, log management, file integrity monitoring and analytics with powerful forensic tools, LogRhythm v6.2 offers security professionals a powerful monitoring and auditing platform to keep them informed, and an excellent investigatory tool in case things go wrong.

McAfee Enterprise Security Manager v9.3.2

starstarstarstarstar
Enterprise Security Manager from McAfee is a truly enterprise-grade SIEM. Able to process thousands of events per second and store billions of events and flows, it offers great visibility into network activity for customers of any size.

NetIQ Sentinel v7.1

starstarstarstar¾
NetIQ’s SIEM helps to quickly identify and respond to threats and to simplify management and compliance reporting. It delivers scalable log collection, aggregation, correlation, and analysis and reporting capabilities through flexible deployment options.

SolarWinds Log Event Manager v5.7

starstarstarstarstar
The SolarWinds Log & Event Manager (LEM) offers a quality set of log management, event correlation, search and reporting facilities.

Check Point Next Generation Threat Prevention Appliance

starstarstarstarstar
The Threat Prevention Appliance from Check Point Technologies provides a solid security platform that can be customized with the addition of several software blades.

Cyberoam Technologies Pvt Ltd CR200iNGXP

starstarstarstarstar
The CR200iNG-XP from Cyberoam Technologies offers full-scale, best-of-breed protection including an intrusion prevention system, gateway anti-virus, spam prevention at the gateway, web content filtering and a web application firewall.

Dell SonicWALL NSA 4600

starstarstarstarstar
The NSA 4600 from Dell SonicWALL incorporates next-generation firewall technology combined with a multi-core hardware platform to provide robust protection at the perimeter of even some of the most demanding networks.

Fortinet FortiGate140DPOE

starstarstarstarstar
The FortiGate-140D-POE from Fortinet offers a built-in firewall, intrusion prevention system, application control, web and email filtering and anti-virus in one solid appliance.

SecPoint Protector P800

starstarstarstarstar
The Protector UTM appliance from SecPoint offers a full set of features packed into a single device.

VASCO aXsGUARD Gatekeeper

starstarstarstar¾
This product provides a complete secure remote access platform that incorporates many perimeter security functions.

WatchGuard XTM 545

starstarstarstarstar
The XTM 545 from WatchGuard provides an excellent mix of best-of-breed functions and an easy-to-manage platform for robust perimeter security.

Bitdefender GravityZone

Take a security server in your virtual environment, add tools on each of the virtual servers you want to protect, throw in a control center in the cloud and you have what you need to protect against malware in the virtual world.

5nine Cloud Security for HyperV

This is the only virtual security product of its type exclusive to Microsoft Hyper-V.

HyTrust CloudControl

This is a security automation product for use in a VMware environment.

Intigua 2.6

Virtual management for virtual environments.

PrivateCore vCage

Secures servers with software-based attestation, full-memory encryption and OS hardening, providing a foundation for trusted computing.

BeyondTrust UVM20 Security Management Appliance

starstarstarstarstar
The UVM20 Security Management Appliance from BeyondTrust offers a full set of vulnerability scanning and compliance tools that are well integrated into a single easy-to-use appliance that features the Retina CS Threat Management Console as the center piece of the suite.

Core Security Insight Enterprise

starstarstarstarstar
Insight Enterprise offers a full vulnerability and risk management platform that can be used to analyze and prioritize vulnerabilities throughout the enterprise to ensure that risk from vulnerabilities is handled effectively.

GFI LanGuard 2014

starstarstarstarstar
LanGuard from GFI Software is back again this year and those who are familiar with the tool will feel right at home with the latest version for 2014.

netVigilance Internal Scan Cloud

starstarstarstarstar
Internal Scan - Cloud Edition from netVigilance offers a full vulnerability testing suite that can scan pretty much anything with an IP address and report on any vulnerabilities.

Qualys QualysGuard Express

starstarstarstarstar
QualysGuard Express from Qualys uses the software-as-a-service (SaaS) model to provide vulnerability and compliance management services to customers.

SecPoint Penetrator

starstarstarstarstar
Virtual machine makes deployment easy, high-gain antenna for Wi-Fi cracking.

Secunia Corporate Software Inspector CSI

starstarstarstarstar
Secunia’s Corporate Software Inspector (CSI) enables users to leverage its signature-based vulnerability scanner via installable software agents and/or a simple-to-use web-based console.

Skybox Security Skybox Risk Control

starstarstarstarstar
Focusing more on total risk than individual threats, this product analyzes networks in a holistic manner, enabling security teams to first remediate threats to hosts that could cause the most damage rather than relying solely on criticality ratings.

Strategic Cyber Cobalt Strike

starstarstarstar½
Strategic Cyber’s Cobalt Strike application is a serious penetration testing and educational tool.

Tenable SecurityCenter Continuous View

starstarstarstarstar
Combining the gold-standard Nessus vulnerability scanner with the powerful Passive Vulnerability Scanner and Log Correlation Engine, Tenable’s Security Center Continuous View brings some of the industry’s best vulnerability management tools under one roof.

Deepnet Security DualShield v5.7

starstarstarstarstar
DualShield v5.7 from Deepnet Security is an authentication platform using multifactor and biometric authentication techniques.

Entrust IdentityGuard

starstarstarstar¼
Entrust IdentityGuard is a multifactor authentication tool that allows users to employ soft tokens, physical hardware tokens, and more.

HID Global ActivID Appliance

starstarstarstar¾
This product offers a wide variety of strong authentication measures for several services and online applications.

IronKey F200 Biometric Flash Drive

starstarstarstarstar
The IronKey F200 Biometric Flash Drive by Imation comes in several sizes for different uses.

RSA Authentication Manager

starstarstarstarstar
The strongest aspects of this product were its support, functionality and ease of use.

SafeNet Authentication Service

starstarstarstar¾
The SafeNet Authentication Service is overall a great product. We particularly found its functionality, set up and documentation to be strong.

SecureAuth IdP

starstarstarstarstar
SecureAuth IdP is a good choice for an authentication solution because it supports a variety of multi-platform authentication devices and the server can be setup in the cloud or on-premises.

SecurEnvoy SecurAccess v7

starstarstarstarstar
SecurEnvoy’s SecurAccess is a product for authentication using multifactor and/or biometrics.

Swivel Secure Swivel Appliance

starstarstarstar½
The Swivel Appliance from Swivel Secure provides strong authentication in a variety of ways.

VASCO IDENTIKEY Authentication Server and DIGIPASS GO

starstarstarstar¼
VASCO IDENTIKEY Authentication Server and DIGIPASS GO in combination are a physical token-based authentication tool.

CA DataMinder Classification

CA DataMinder Classification “discovers and classifies sensitive structured and unstructured content stored within file servers, databases, collaboration tools and storage repositories.

TITUS Classification

Provides email and document classification – when both products are used – for Microsoft platforms.

Verdasys Managed Service

As part of the Digital Guardian program, provides data classification.

Varonis DatAdvantage and IDU Classification Framework

Provides data classification for human-generated files, such as documents and SharePoint files or any human-generated files that reside on file servers.

Workshare Enterprise

SaaS-delivered secure collaboration application.

Barracuda Web Application Firewall Model 660

starstarstarstarstar
Model 660 is a useful tool that provides protection for web applications.

BIGIP Application Security Manager ASM

starstarstarstar¾
The tool takes advantage of IP reputation, context and categorization to analyze incoming and outgoing IP addresses.

FortiDB1000C

starstarstarstarstar
A comprehensive database security management tool that provides vulnerability assessment, auditing and monitoring for database management systems.

SecureSphere X1010 Web Application Firewall X1010

starstarstarstar¾
The appealing aspect of the SecureSphere X1010 Web Application Firewall X1010 - and other Imperva servers - was the preloaded policies that were already running once the server was up and operating.

SecureSphere Database Activity Monitoring X2500

starstarstarstar½
This solution provides protection against such attacks as SQL injection. It is intended to be used with SecureSphere Web Application Firewall.

McAfee Database Security Solution

starstarstarstarstar
McAfee describes the functionality of the tool as providing "the five essentials for database protection: discovery, assessment, monitoring, prevention and compliance."

Avatier Identity Management Suite AIMS v9

starstarstarstarstar
AIMS provides a complete set of identity management (IdM), network access control (NAC) and data leakage prevention (DLP) features.

Bradford Networks Network Sentry v6.1

starstarstarstarstar
Network Sentry monitors edge connections to a network and provisions the appropriate level of network access based on role-based security policies.

Centrify Suite 2013.2 Platinum Edition

starstarstarstar¾
By leveraging an existing infrastructure enterprise, Centrify Suite 2013.2 Platinum Edition provides central control and securing and auditing of user access through cross-platform systems, mobile devices and applications.

Code Green Networks TrueDLP v8.1

starstarstarstar¾
TrueDLP is delivered via Code Green Networks’ Content Inspection (CI) Appliances.

Fischer International Identity Fischer Identity v5.2

starstarstarstar¾
The Fischer International Identity solution is a set of high-availability Java applications for SaaS (software-as-a-service) and on-premise, running on open source or commercial off-the-shelf (COTS) platforms (OS, DB, directory, etc.).

ForeScout CounterACT v7.0

starstarstarstarstar
ForeScout CounterACT offers an enterprise-class NAC platform that assures network access based on real-time endpoint classification configuration assessment, user and endpoint compliance policy and automated response.

Hitachi ID Management Suite v8.2.1

starstarstarstarstar
The Hitachi ID Management Suite v8.2.1 contains several identity management components that are well integrated to form a fairly comprehensive suite.

Lieberman Software Enterprise Random Password Manager v4.83.6

starstarstarstarstar
The Enterprise Random Password Manager (ERPM) from Lieberman Software is more than just a random password generator.

NetIQ Identity Manager v4.0.2

starstarstarstarstar
Identity Manager from NetIQ provides tools for managing the entire user identity lifecycle – from on-boarding through deletion and everything in-between.

Sign up to our newsletters

POLL