Editorial Staff Blogs

Executive Insight

SC Directors Cut

Reboot ’17 Industry Innovators eBook



GET SC MEDIA DELIVERED TO YOUR INBOX

Product Reviews

Carbon Black Cb Defense

Verdict: For a mix of threat analysis and incident response – where the core of the alert is malware-based – this one demands your attention. The Carbon Black experience is obvious.

Comodo Advanced Endpoint Protection

Verdict: This is a strong product under the covers but with a few warts for users. None of those are show-stoppers, though, and you would do well to take a close look at it.

SC Magazine Recommended

CrowdStrike Falcon

Verdict: This is a very sophisticated but rather specialized tool for the endpoint. If you are a large organization or one with high-value information assets, this is well worth your time. For what it does, we know of no better tool available. We make this our cloud-based Recommended product.

SC Magazine Recommended

Cylance CylancePROTECT with CylanceOPTICS

Verdict: If you are using CylancePROTECT this is a no-brainer. If you are not, it’s a good reason to consider it. Because CylancePROTECT is one of our SC Lab Approved products, it already has our highest rating, but we are naming the OPTICS add-on Recommended for the value that it adds ...

Whitepapers

Gartner Magic Quadrant for Application Security Testing

For the 4th report in a row, Veracode is recognized as a Leader by Gartner for Application Security Testing. The position is based on completeness of vision and ability to execute...

Breach Detection Systems: Product Selection Guide

Breach detection systems are tools offering timely detection of threats - measured by traditional factors as well as advanced metrics. Download this guide for a comprehensive look...

DNS Forensics: Where Intuition Meets Experience

Learn how a DNS-centric approach to unraveling sophisticated attacks can bring stunning results to your cybersecurity strategy.

SC Media Spotlight on Security Planning

Security planning is a key component of an enterprise's overallinformation security strategy. It includes developing policies and procedures for incident response, IT and security...