Verdict: For a mix of threat analysis and incident response – where the core of the alert is malware-based – this one demands your attention. The Carbon Black experience is obvious.
Verdict: This is a strong product under the covers but with a few warts for users. None of those are show-stoppers, though, and you would do well to take a close look at it.
Verdict: This is a very sophisticated but rather specialized tool for the endpoint. If you are a large organization or one with high-value information assets, this is well worth your time. For what it does, we know of no better tool available. We make this our cloud-based Recommended product.
Verdict: If you are using CylancePROTECT this is a no-brainer. If you are not, it’s a good reason to consider it. Because CylancePROTECT is one of our SC Lab Approved products, it already has our highest rating, but we are naming the OPTICS add-on Recommended for the value that it adds ...
Editorial Staff Blogs
How to Safeguard Against MAC Spoofing
This white paper explores the MAC spoofing problem, covers best practices, and evaluates the effective solutions available to thwart off MAC spoofing attacks.
Intelligent Threat Response & Risk Reduction for the Mobile Workforce
Watch this webinar from TechTarget “Intelligent Threat Response and Risk Reduction for Today’s Mobile Workplace” and learn how to use data and analytics to protect your enterprise...
SC Media eBook on Endpoint Security
How do CISOs defend against endpoint attacks? This ebook looks at capabilities of basic endpoint security, as well as addresses how CISOs can defend against more sophisticated attacks...
SC Media eBook on Data Loss Prevention
This eBook looks at today’s best practices for making the attackers’ efforts unproductive.