Editorial Staff Blogs

Executive Insight

SC Directors Cut

Reboot ’17 Industry Innovators eBook



GET SC MEDIA DELIVERED TO YOUR INBOX

Product Reviews

Carbon Black Cb Defense

Verdict: For a mix of threat analysis and incident response – where the core of the alert is malware-based – this one demands your attention. The Carbon Black experience is obvious.

Comodo Advanced Endpoint Protection

Verdict: This is a strong product under the covers but with a few warts for users. None of those are show-stoppers, though, and you would do well to take a close look at it.

SC Magazine Recommended

CrowdStrike Falcon

Verdict: This is a very sophisticated but rather specialized tool for the endpoint. If you are a large organization or one with high-value information assets, this is well worth your time. For what it does, we know of no better tool available. We make this our cloud-based Recommended product.

SC Magazine Recommended

Cylance CylancePROTECT with CylanceOPTICS

Verdict: If you are using CylancePROTECT this is a no-brainer. If you are not, it’s a good reason to consider it. Because CylancePROTECT is one of our SC Lab Approved products, it already has our highest rating, but we are naming the OPTICS add-on Recommended for the value that it adds ...

Whitepapers

Ransomware and the Limits of Conventional Protection

Download this report to learn more about one of today's greatest threats, ransomware. Either you pay up, or you lose your data. Simply put, your data is held hostage.

Forcepoint CASB Sheds Light on the Cloud App Visibility Blind ...

This whitepaper addresses the challenges that stem from cloud app adoption and prioritizes the methods that organizations should use in order to gain visibility and reduce security...

Learn Why Your OTT Content Distribution Strategies Can Make or ...

Content is king; there’s no way around it. But in today’s era where a post, video, movie or other digital assets can instantly go viral, how can you set effective perimeters to guard...

Privileged Users: The Threat from Within

This whitepaper explains why privileged users present a greater risk than other employees, and whether or not your organization is at risk. It also provides best practices for mitigating...