Editorial Staff Blogs
Verdict: For a mix of threat analysis and incident response – where the core of the alert is malware-based – this one demands your attention. The Carbon Black experience is obvious.
Verdict: This is a strong product under the covers but with a few warts for users. None of those are show-stoppers, though, and you would do well to take a close look at it.
Verdict: This is a very sophisticated but rather specialized tool for the endpoint. If you are a large organization or one with high-value information assets, this is well worth your time. For what it does, we know of no better tool available. We make this our cloud-based Recommended product.
Verdict: If you are using CylancePROTECT this is a no-brainer. If you are not, it’s a good reason to consider it. Because CylancePROTECT is one of our SC Lab Approved products, it already has our highest rating, but we are naming the OPTICS add-on Recommended for the value that it adds ...
Gartner Magic Quadrant for Application Security Testing
For the 4th report in a row, Veracode is recognized as a Leader by Gartner for Application Security Testing. The position is based on completeness of vision and ability to execute...
Breach Detection Systems: Product Selection Guide
Breach detection systems are tools offering timely detection of threats - measured by traditional factors as well as advanced metrics. Download this guide for a comprehensive look...
DNS Forensics: Where Intuition Meets Experience
Learn how a DNS-centric approach to unraveling sophisticated attacks can bring stunning results to your cybersecurity strategy.
SC Media Spotlight on Security Planning
Security planning is a key component of an enterprise's overallinformation security strategy. It includes developing policies and procedures for incident response, IT and security...