Editorial Staff Blogs
Verdict: For a mix of threat analysis and incident response – where the core of the alert is malware-based – this one demands your attention. The Carbon Black experience is obvious.
Verdict: This is a strong product under the covers but with a few warts for users. None of those are show-stoppers, though, and you would do well to take a close look at it.
Verdict: This is a very sophisticated but rather specialized tool for the endpoint. If you are a large organization or one with high-value information assets, this is well worth your time. For what it does, we know of no better tool available. We make this our cloud-based Recommended product.
Verdict: If you are using CylancePROTECT this is a no-brainer. If you are not, it’s a good reason to consider it. Because CylancePROTECT is one of our SC Lab Approved products, it already has our highest rating, but we are naming the OPTICS add-on Recommended for the value that it adds ...
Breaking the Kill Chain Stopping Data Breaches
Privileged Access Management solutions provides capabilities that prevent attackers from carrying out key components of their attacks—breaking the breach kill chain—as well as reducing...
2017 Endpoint Protection Ransomware Effectiveness Report
It's estimated that in 2016, the cost of ransomware was over $1 Billion. Every organization is at risk and with over 33% of businesses experiencing an attack, it's more important than...
SC Media eBook on Threat Intelligence
This eBooks looks at some of the ways CISOs are sharing intelligence in order to build better defenses and the challenges they face in making sure this intelligence is actionable.
Application security: Applications are the new network-edge device eBook
Cybersecurity pros steeped in endpoint and network security must expand their expertise into applications – and developers need to come to grips with their own security challenges.