Celebrating security's best
The SC Awards Program is our way too let companies showcase how much they care about their customers and clients and show their everyday support and promotion of security principals in their own organizations, as well as within their own business markets.
For a complete look at the 2018 Award winners click on the image to the left.
Verdict: Catering to no-frills, quick implementation expectations, this solution also delivers a modern approach with their instant-chat support available with one click.
Verdict: CrowdStrike Falcon continues to be a sophisticated toolset that focuses on all three phases of a malware attack. The cloud-based management dashboard provides very detailed information to help identify threats and remove them from your assets. If your organization puts a high value on information, this product should be near ...
Verdict: A very complete product that delivers on all levels. enSilo offers a strong Next-Gen AV paired with Application Communication Control and Endpoint Detection and Response solutions.
Verdict: Recommended solution to fit into your layered security approach to solve phase 1 of the ransomware stack. This specialized solution would be a great addition to any organization taking steps to protect the email threat vector.
Verdict: This reliable name has the depth and scope to address the needs of any-sized organization. With a variety of support options, this platform is ready for simple or complex deployments.
Verdict: If you don’t want to limit yourself to a single toolset, this solution provides a wide variety of technologies from which to choose.
Verdict: This is a strong product and, complicated as it might appear on the surface, there is a lot of help to get you going and to get the tool functional and producing useful output. This is one of our Recommended products for the month.
Verdict: While we liked this product, there are peripheral aspects that need some cleanup. Pricing seems reasonable but if you have a lot of packages it could get expensive. In any event, it certainly is well worth your time to give it a closer look. We make this one of our ...
Editorial Staff Blogs
CEO Fraud Prevention Manual
Cyber-risk management remains a blind spot for most C-level executives. Any company must quickly learn to integrate these skills and technologies into day-to-day operations – or face...
Threat Intelligence: A New Approach
Learn more about the new approach to sharing threat intelligence and develop a methodology to measure the effectiveness of your current security infrastructure.
The Definitive Guide to Visibility Use Cases
This book provides a collection of the top 68 network visibility use cases, along with a brief overview of how to implement each one. These summaries allow you to determine which use...
Phishing Response Trends - It's a Cluster
Download your report to learn about the implications of our phishing response data and what organizations can do to improve their anti-phishing security.