Celebrating security's best
The SC Awards Program is our way too let companies showcase how much they care about their customers and clients and show their everyday support and promotion of security principals in their own organizations, as well as within their own business markets.
For a complete look at the 2018 Award winners click on the image to the left.
Verdict: Catering to no-frills, quick implementation expectations, this solution also delivers a modern approach with their instant-chat support available with one click.
Verdict: CrowdStrike Falcon continues to be a sophisticated toolset that focuses on all three phases of a malware attack. The cloud-based management dashboard provides very detailed information to help identify threats and remove them from your assets. If your organization puts a high value on information, this product should be near ...
Verdict: A very complete product that delivers on all levels. enSilo offers a strong Next-Gen AV paired with Application Communication Control and Endpoint Detection and Response solutions.
Verdict: Recommended solution to fit into your layered security approach to solve phase 1 of the ransomware stack. This specialized solution would be a great addition to any organization taking steps to protect the email threat vector.
Verdict: This reliable name has the depth and scope to address the needs of any-sized organization. With a variety of support options, this platform is ready for simple or complex deployments.
Verdict: If you don’t want to limit yourself to a single toolset, this solution provides a wide variety of technologies from which to choose.
Verdict: This is a strong product and, complicated as it might appear on the surface, there is a lot of help to get you going and to get the tool functional and producing useful output. This is one of our Recommended products for the month.
Verdict: While we liked this product, there are peripheral aspects that need some cleanup. Pricing seems reasonable but if you have a lot of packages it could get expensive. In any event, it certainly is well worth your time to give it a closer look. We make this one of our ...
Editorial Staff Blogs
Bits in a Box: Containers, a UNIX one-trick pony, make ...
The container-vs-virtual machine debate confirms one important sea change for security professionals: containers are back from their UNIX heyday, bringing speed and scalability to...
Breach & Attack Simulation VS Pen Testing VS Vulnerability Scanning
Download this whitepaper to learn the pros and cons of vulnerability scans and penetration tests, as well as the new and effective approach to cybersecurity validation.
What You Can Do to Strengthen Cloud Security
Security is a shared responsibility that requires investment by both cloud providers and users. So, what can organizations do to strengthen security of the cloud environments? This...
EMA Radar<sup>TM</sup> for Digital Threat Intelligence Management: Q4 2017
The EMA Radar for Digital Threat Intelligence Management: Q4 2017 Report evaluates threat intelligence management providers by their ability to help organizations combat a new generation...