Editorial Staff Blogs
Verdict: Not much to say here besides that this product is SC Lab Approved and that is our highest award. This is one of the best UTMs we’ve tested and over long periods of use it has delivered very well. We make it SC Lab Approved for another year.
Verdict: Especially for organizations with limited expertise in applying all of the things a SIEM can do to protect their enterprises, this product is a must-see. However, any size organization can benefit by considering this as part of its security stack.
Verdict: There is a lot to getting this one up and running, but once it’s up and you have the things you want to monitor plugged in, this one of the most complete SIEMs we’ve seen.
Verdict: We like this a lot, especially for SMBs, although larger organizations certainly should not rule it out as too small. It’s not. For its value and feature set, as well as the efforts to improve and keep the product ahead of the curve, we make this our Best Buy.
SSL: Enterprise’s New Attack Frontier
SSL and TLS have become an integral part of the Internet, and adoption rates have skyrocketed. This growth offers significant opportunities—but also comes with risks.
Top 6 Tips for Explaining Why Your Application Security Journey ...
Web attacks are the most frequent pattern in confirmed breaches, yet application security remains only a fraction of overall security spending. Download this eBook for 6 tips on explaining...
Keeping Up with the Evolution of Security Operations Centers
There are several steps along the SOC maturity curve and different paths to get there. Join the Foundstone Services team as they discuss the elements of a modern SOC, maturity levels...
Unmask Evasive Threats
Modern malware masks itself to evade detection. It hides by piggybacking or misusing legitimate applications. With state-of-the-art threat detection and containment tools, organizations...