Celebrating security's best
The SC Awards Program is our way too let companies showcase how much they care about their customers and clients and show their everyday support and promotion of security principals in their own organizations, as well as within their own business markets.
For a complete look at the 2018 Award winners click on the image to the left.
Verdict: Catering to no-frills, quick implementation expectations, this solution also delivers a modern approach with their instant-chat support available with one click.
Verdict: CrowdStrike Falcon continues to be a sophisticated toolset that focuses on all three phases of a malware attack. The cloud-based management dashboard provides very detailed information to help identify threats and remove them from your assets. If your organization puts a high value on information, this product should be near ...
Verdict: A very complete product that delivers on all levels. enSilo offers a strong Next-Gen AV paired with Application Communication Control and Endpoint Detection and Response solutions.
Verdict: Recommended solution to fit into your layered security approach to solve phase 1 of the ransomware stack. This specialized solution would be a great addition to any organization taking steps to protect the email threat vector.
Verdict: This reliable name has the depth and scope to address the needs of any-sized organization. With a variety of support options, this platform is ready for simple or complex deployments.
Verdict: If you don’t want to limit yourself to a single toolset, this solution provides a wide variety of technologies from which to choose.
Verdict: This is a strong product and, complicated as it might appear on the surface, there is a lot of help to get you going and to get the tool functional and producing useful output. This is one of our Recommended products for the month.
Verdict: While we liked this product, there are peripheral aspects that need some cleanup. Pricing seems reasonable but if you have a lot of packages it could get expensive. In any event, it certainly is well worth your time to give it a closer look. We make this one of our ...
Editorial Staff Blogs
Techniques to Deal with Ransomware, Business Email Compromise, and Spearphishing
Download this new Osterman Research whitepaper for best practices in defending against Ransomware, business email compromise, and spearphishing.
North Korea Cybersecurity Profile
This research report provides a detailed examination of North Korea's cybersecurity landscape, analyzing political context, international relations, security posture, economy, cyber-strategy...
SANS Institute: A DevSecOps Transformation
Many executives believe the shift to agile business will disrupt their industries, driving the move to Continuous Integration and Deployment. This infographic gives you seven InfoSec...
6 Easy Ways to Advance Your Cybersecurity Program When You ...
Security teams struggle with managing incoming threat data and prioritizing alerts. Don’t let the size of your team hold you back. Take 6 steps to advance your team and stop adversaries...