Verdict: This one really demands your attention if you are working in a hybrid environment. We have seen nothing that quite compares and the technology used is both unique and innovative. For its hybrid focus this is one of our Recommended products this month.
Verdict: While this is not a true next generation tool, neither is it a traditional one. This is one of those unique products that has, truly, carved its own niche and it has done that quite well.
Verdict: Tufin is a progressive and capable vendor in this space. We have watched their product evolve over the years and it is very good example of the next generation risk and policy management genre.
Verdict: This is a capable tool and meets its objectives well.
Verdict: For a pure-play GRC this is about the most solid product we’ve seen. If GRC is what you want, and you need next generation, look at this one. We predict you’ll like what you see.
Verdict: This always has been one of our top picks over the years. This year it did not disappoint us, even though it has moved to a new home. We make this our Recommended traditional products this month.
Verdict: When it comes to change management it is hard to beat this tool. But along with that it is a very competent cyber risk management platform. Well worth your time, even if you have other GRC tools that it can work alongside. This is our next generation Recommended tool this ...
Verdict: This one is worth a close look. It has all the tools you need to manage the security on your enterprise and it is very straightforward to use.
Editorial Staff Blogs
Cloud Security Survey: 2017 Results
A yearly survey is conducted with the 350,000+ members of the LinkedIn InfoSec Community on the state of cloud security. This year's results explores many topics, from adoption barriers...
The Rebirth of Endpoint Protection
When assessing advanced endpoint protection, analysts must often rely on comparing limited information from less-than-ideal conditions. What companies need are security efficacy comparisons...
Ransomware and the Limits of Conventional Protection
Download this report to learn more about one of today's greatest threats, ransomware. Either you pay up, or you lose your data. Simply put, your data is held hostage.
The DevSecOps Approach to Securing Your Code and Your Cloud
Having infosec, app dev, and IT ops immersed in all development activities makes it easier to integrate controls into the pipeline without causing delays. This paper walks you through...