Verdict: This is a strong product and, complicated as it might appear on the surface, there is a lot of help to get you going and to get the tool functional and producing useful output. This is one of our Recommended products for the month.
Verdict: While we liked this product, there are peripheral aspects that need some cleanup. Pricing seems reasonable but if you have a lot of packages it could get expensive. In any event, it certainly is well worth your time to give it a closer look. We make this one of our ...
Verdict: This is the 800-pound gorilla in this space. It has just about everything – and what it doesn’t have it certainly soon will. We make this our Best Buy this month.
Verdict: This one really demands your attention if you are working in a hybrid environment. We have seen nothing that quite compares and the technology used is both unique and innovative. For its hybrid focus this is one of our Recommended products this month.
Editorial Staff Blogs
SANS Institute: A DevSecOps Transformation
Many executives believe the shift to agile business will disrupt their industries, driving the move to Continuous Integration and Deployment. This infographic gives you seven InfoSec...
Techniques to Deal with Ransomware, Business Email Compromise, and Spearphishing
Download this new Osterman Research whitepaper for best practices in defending against Ransomware, business email compromise, and spearphishing.
The Clock is Ticking on GDPR
GDPR is right around the corner. We look at how you should prioritize your time to reduce your vulnerability, providing expert advice on what to do and, more importantly, what not...
Is the Thrill of Your SIEM Gone?
SIEM technology is evolving, but it remains the cornerstone of corporate security. What's the future for SIEM and will it remain relevant tomorrow? This eBook looks at how it is evolving...