Attivo BOTsink

This is deception technology. It is, really, a high interaction honeypot on steroids. The system consists of two pieces: the BOTsink - a deception platform and IRES (Information Relay and Entrapment System) deception lures.

CRU SCILock

This product – with its objective of defeating persistent malware – is a fit for active breach detection.

Fidelis XPS

There really is little, if anything, that XPS cannot do in the digital forensics detection, analysis, prevention and response arena.

GuardiCore Data Center Security Suite

The GuardiCore suite exhibits characteristics of both active breach detection and threat deception plus a whole lot more.

illusive networks illusive

illusive is a very cool product that has as its main purpose focusing on the actors rather than the malware in an attack.

LightCyber Magna

LightCyber provides us with a behavioral attack detection tool.

Rapid7 UserInsight

Rapid7 has been in the vulnerability game for a long time and now have gotten into the active detection game.

TrapX DeceptionGrid

The whole focus of TrapX is based on operationalizing deception as a defensive activity.

Vectra Networks XSeries Platform

This is an active breach detection tool with a very particular focus: malware, most especially APTs.

Acuity Risk Management STREAM Integrated Risk Manager

starstarstarstarstar
STREAM is an integrated risk management tool delivered as a software product consisting of a database server, an application server and a client component.

Agiliance RiskVision

starstarstarstarstar
This is a hybrid application. It has many of the aspects of a traditional GRC platform and many of the technology-centric attributes. But, for all of that, it is biased toward risk management, albeit with many other GRC trappings.

AlgoSec Security Management Suite

starstarstarstarstar
This is a very specialized product. Its premise – and a good one it is – is that the firewall(s) manage the risk in any system.

Allgress Insight Risk Manager

starstarstarstarstar
This is an interesting product. It focuses on taking GRC into an IT environment and aligning it with business priorities to manage security and compliance.

FireMon Security Intelligence Platform

starstarstarstarstar
FireMon Security Intelligence Platform is focused on monitoring and managing firewalls.

MetricStream Risk Management Application and Policy and Document Application

starstarstarstarstar
This is a modular application delivered as SaaS or on-premise.

RSA Archer GRC

starstarstarstarstar
The RSA Archer GRC is a platform that integrates with a number of modules such as policy management, vulnerability risk management and content library.

Rsam GRC Platform

starstarstarstarstar
Rsam is undeniably a traditional GRC product but with a few nice twists.

Skybox SecuritySkybox Enterprise Suite

starstarstarstarstar
Skybox Enterprise Suite is strongly focused on the risk part of GRC.

SolarWinds Network Configuration Manager

starstarstarstarstar
The Network Configuration Manager takes everything that SolarWinds does well and wraps it in a cloak of GRC functionality.

Tripwire Enterprise

starstarstarstarstar
Tripwire Enterprise is a security configuration and change management tool.

Trusted Integration TrustedAgent GRC

starstarstarstar½
TrustedAgent GRC is risk-focused and takes a decidedly traditional GRC approach.

Tufin Orchestration Suite

starstarstarstarstar
Tufin Orchestration Suite is a tool that decidedly is on the technical side of GRC management.

Modulo Risk Manager v9.2

starstarstarstarstar
This is a traditional approach to GRC with the added benefit of being able to consume vulnerability data from third-party scanners.

AccessData Forensic Suite

starstarstarstarstar
We have been using AccessData tools for years and they never disappoint.

CRU Ditto Forensic FieldStation

starstarstarstar½
This is a simple tool but it may be one of the most important in your kit.

Guidance Software EnCase 7.10

starstarstarstarstar
EnCase has a long history in law enforcement and, in recent years, has moved strongly into the corporate world.

Distil Networks

starstarstarstarstar
Distil inspects each http request in real time to determine if it is a malicious bot.

IntaForensics Lima Forensic Case Management

starstarstarstarstar
This should be in every digital forensic lab, especially those that need to track evidence for use in court.

MSAB XRY Office

starstarstarstar½
XRY Office is a mobile device analysis tool, unusual in that it is very strong in recovering forensic data from devices that are locked without having to know the unlock code.

PacketSled

starstarstarstarstar
PacketSled is a cloud-based breach detection and network forensics tool that provides real-time detection of threats as they cross the wire, and retroactive investigation of host activity including the application of new indicators to historical data.

Cellebrite UFED Series

starstarstarstarstar
We are looking at three powerful tools in the UFED series: UFED 4PC Ultimate, UFED Link Analysis and the new UFED Cloud Analyzer.

MSAB XRY Office

starstarstarstar½
XRY Office is a mobile device analysis tool, unusual in that it is very strong in recovering forensic data from devices that are locked without having to know the unlock code.

CylancePROTECT

starstarstarstarstar
This product is the poster child for next-generation anti-malware.

DeviceLock Endpoint DLP Suite

starstarstarstarstar
The Swiss Army knife of endpoint security.

ESET Endpoint Security

starstarstarstarstar
ESET Endpoint Security is one of the products that does a lot of different functions.

Guidance Software EnCase Endpoint Security

starstarstarstarstar
EnCase Endpoint Security really has two parts: Threat Detection and Incident Response.

Invincea Advanced Endpoint Protection AEP

starstarstarstarstar
Advanced Endpoint Protection (AEP) is a very competent anti-malware tool that really focuses on the task at hand: protecting the endpoint from malware threats.

Pulse Secure PulseWorkspace

starstarstarstarstar
Pulse Secure PulseWorkspace is just for mobile device endpoints. It functions on iOS or Android and, as we are seeing more frequently, it depends on containerization.

Raytheon Websense SureView Insider Threat

starstarstarstar½
SureView Insider Threat is largely an investigative platform.

SentinelOne EPP Endpoint Protection Platform

starstarstarstarstar
SentinelOne EPP (Endpoint Protection Platform) is an anti-malware approach to endpoint security on Windows, OS X and Android devices.

ThreatTrack Security VIPRE Business Premium

starstarstarstar¾
VIPRE Business Premium is one of the endpoint products that focuses on malware and it does it well.

Trend Micro Smart Protection Complete

starstarstarstarstar
While Smart Protection Complete suite has a strong anti-malware component, it also features port and device controls, endpoint encryption and DLP.

Adallom Cloud Application Security Platform

This cloud access security broker supports a huge number of cloud applications and is simple to deploy and seamless to users.

Alert Logic Cloud Defender

This suite of tools from Alert Logic protects data in multiple locations, including on-premises.

Bitglass Enterprise Edition BEE

The heart of Bitglass Enterprise Edition (BEE) is digital rights management (DRM).

Elastica CloudSOC Platform

CloudSOC is a new security stack defined for the cloud, residing in the cloud and provisioned from the cloud.

FireLayers Secure Cloud Gateway SCG

FireLayers Secure Cloud Gateway (SCG) is another approach to securing applications in the cloud.

Illumio Adaptive Security Platform ASP

Stops the spread of attacks with security that enforces precise inbound and outbound communications on every workload based on natural language policies for application interactions.

iSheriff Cloud Security

Integrated security management tool deployed in the cloud.

Lumeta Enterprise Situational Intelligence ESI

Provides situational awareness of network architecture, segmentation and cybersecurity, supporting decision-making impacting security and compliance relating to cloud or virtual environments.

Palerra LORIC

Combines security configuration management, threat detection, predictive analytics and automated incident response for cloud assets from branded applications, such as Microsoft Office 365, to infrastructure, such as AWS.

Perspecsys AppProtex Cloud Data Protection Platform

Addresses compliance, security and privacy issues for cloud-based applications.

BitDefender Gravity Zone

Centralizes and de-duplicates security tools, such as anti-malware, in a virtual environment.

Catbird Insight

Automatically and continuously discovers all assets in the virtual infrastructure, allows the grouping of these assets into logical Catbird Trust Zones.

5nine Software Cloud Security

Virtual system security, specifically for Hyper-V environments.

HyTrust DataControl

Cloud security automation through encryption.

Gurucul Risk Analytics

Behavior-based machine learning and predictive analytics.

Intigua Virtualized IT Operations Command Center

Virtualizes existing management tools using proprietary container technology to encapsulate them in their entirety, and enables them to be centrally managed and automated via a policy engine.

Kaspersky Security for Virtualization

A suite of protection functions for VMware, Citrix and Microsoft virtualized environments.

Menlo Security Isolation Platform

Prevents impact of malware by isolating all user activity and cleaning any malicious files before presenting to the user.

Tresorit

Secure file sharing and collaboration in the cloud.

Boldon James Classifier v3.7

starstarstarstar½
The Boldon James Classifier bundle is a comprehensive data leakage prevention solution that is easy to implement in organizations large and small.

Code Green NetworksTrueDLP

starstarstarstar½
Code Green Network’s TrueDLP product is an extremely effective solution to data leak protection.

Identity Finder Sensitive Data Manager

starstarstarstarstar
Identity Finder Sensitive Data Manager takes a robust approach to data leakage prevention, offering maximum security across almost any networked device.

Varonis DatAdvantage and Data Classification Framework

starstarstarstarstar
Varonis DatAdvantage and the Data Classification Framework work to identify where any and all of your sensitive and proprietary information lies.

AlienVault Unified Security Management USM

starstarstarstar½
The AlienVault Unified Security Management platform is one of the most unique products we have ever had the pleasure of reviewing.

Check Point Software Technologies 1180 Next Generation Threat Prevention Appliance

starstarstarstarstar
Check Point Software 1180 Next Generation Threat Prevention Appliance (NGTP) is a unified threat management (UTM) firewall, router, gateway and wireless access point.

CorreLog SIEM Correlation Server v5.5.0

starstarstarstarstar
The CorreLog SIEM Correlation Server is a flexible solution to strengthening security on a network.

Cyberoam Technologies CR1000iNGXP

starstarstarstar½
Cyberoam CR1000iNG-XP is a next-generation firewall appliance that includes VPN, email, anti-virus, HTTP and HTTPS and FTP anti-virus, anti-spam and IPS with custom signatures inside the modular appliance.

Dell SonicWALL NSA 3600

starstarstarstar½
The Dell SonicWALL NSA 3600, along with its TotalSecure license bundle, is the company’s offering for the UTM gateway and next-generation firewall market.

EiQ Networks SecureVue

starstarstarstar¼
The EiQ Networks SecureVue software suite is a comprehensive log and asset management system that lets network administrators quickly get the full picture of what is going on in their network.

EventTracker Security Center v7.6

starstarstarstarstar
The EventTracker Security Center v7.6 is a great solution for enterprise security information and event management (SIEM).

LogRhythm Security Intelligence Platform

starstarstarstar½
LogRhythm is a security information and event manager that is extremely customizable, functional and user friendly.

ManageEngine EventLog Analyzer v10.0

starstarstarstarstar
The EventLog Analyzer from ManageEngine is quickly installed and easily scalable software that can be implemented for a network’s SIEM solution.

McAfee Enterprise Security Manager ESM

starstarstarstarstar
Intel Security’s McAfee Enterprise Security Manager (ESM) is a security information and event management suite. It is available as a VM or hardware appliance and supports a massive number of products to produce useful information for security administrators.

Netikus EventSentry v3.1.1.29

starstarstarstarstar
The EventSentry from Netikus brings to the table a plethora of functionality to ensure system security.

NetIQ Sentinel v7.3

starstarstarstarstar
The NetIQ Sentinel may be one of the best SIEM solutions for your network.

SolarWinds Log Event Manager

starstarstarstar¾
SolarWinds Log & Event Manager is one of the most popular SIEMs on the market today – and with good reason.

WatchGuard Firebox M440

starstarstarstarstar
The Firebox M440 is the latest next-generation firewall offering from WatchGuard.

ZyXEL Communications USG1900

starstarstarstar½
The ZyXEL Communications USG1900 is a comprehensive UTM firewall that is brilliantly simple to set up.

Deepnet Security DualShield v5.8.1

starstarstarstarstar
DualShield is an enterprise-grade, unified, multifactor authentication platform that protects all commonly used business applications with a large selection of multifactor authentication methods.

VASCO DIGIPASS 760 and DIGIPASS for Mobile

starstarstarstarstar
DIGIPASS 760 is a trusted hardware device for visual transaction-signing that creates a secure optical communication channel between the end-user (client) and the organization (server).

Entrust IdentityGuard

starstarstarstar½
Entrust IdentityGuard is a dual-factor authentication server, app, smart card manager, biometrics server and general jack-of-all-trades when it comes to dual-factor authentication.

Gemalto SafeNet Authentication Service

starstarstarstar¾
SafeNet Authentication Service is a cloud-based authentication service that uses a wide range of tokens and custom agents to support multifactor authentication to include one-time passwords generated by a phone app, SMS, a hardware token or email.

Imation IronKey F200 Flash Drive

starstarstarstarstar
The Imation IronKey F200 Flash Drive is a simple, easy to set up and extremely secure device for users who need to transport confidential data between computers.

Cyphercor LoginTC

starstarstarstar½
LoginTC from Cyphercor is a cloud-based solution that uses a mobile device or a desktop for authentication. It has easy-to-use iOS, Android and Chrome desktop applications to approve logins to a variety of products.

PistolStar PortalGuard

starstarstarstarstar
PortalGuard is a multifactor authentication, web-based single sign-on (SSO) through internet information services (IIS) and self-service password reset server and application rolled into one.

RSA Authentication Manager

starstarstarstarstar
The RSA Authentication Manager is a dual-factor authentication system designed from the ground up for enterprise deployment.

SecureAuth IdP

starstarstarstarstar
SecureAuth IdP is an identity provider – with a unique approach to securing user access control.

Swivel Secure Swivel Appliance

starstarstarstarstar
The Swivel Appliance is a competitive solution for two-factor authentication methods for clients searching for a secure product.

BeyondTrust UVM20 Security Management Appliance

starstarstarstar½
The BeyondTrust UVM20 Security Management Appliance is the preconfigured hardware offering of Retina CS Enterprise Vulnerability Management.

Core Security Core Insight

starstarstarstarstar
Core Security’s Core Insight is the gold standard for penetration testing and vulnerability assessment.

Qualys Express Lite

starstarstarstarstar
Qualys Express Lite is a cloud-based vulnerability assessment tool intended for small businesses.

Rapid7 Nexpose Ultimate Appliance

starstarstarstarstar
Rapid7 Nexpose Ultimate is a comprehensive vulnerability scanner that is determined to convince you of its findings.

SAINT Security Suite

starstarstarstarstar
The SAINT Security Suite is a robust software package that quickly and easily gives a heads-up view of vulnerabilities on the network.

Secunia Corporate Software Inspector CSI

starstarstarstar½
Secunia Corporate Software Inspector (CSI) inspects software on any Windows or Android device with an agent.

Skybox View Enterprise Suite

starstarstarstarstar
The Skybox Enterprise Suite is an enterprise vulnerability assessment tool that is deployed to aid in vulnerability and threat management, as well as security policy management.

Tenable Network Security Nessus

starstarstarstarstar
Tenable Network Security Nessus is one of the most comprehensive and widely deployed vulnerability assessment tools.

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US