Verdict: AlienVault continues to be an amazing UTM solution for businesses of all sizes.
Verdict: CorreLog’s SIEM Correlation Server software is a full-feature solution at an amazing price point. We feel that this solution will compliment any security team big or small.
Verdict: If your organization has 20 or 2,000 assets, EventTracker 9.0 can help improve your information gathering and decision-making process and shorten incident response times. If you haven’t looked at EventTracker 9.0, you should.
Verdict: FortiGate products have come a long way and the FortiGate 501E shines above the competition. If you are looking for a mid to large enterprise level Firewall that packs a punch with competitive pricing, check this out.
Verdict: LogRhythm has always been one of the top names in this space, and the new version continues to showcase why it needs to be considered part of your SOC.
Verdict: This solution is very customizable and requires very little knowledge to get up and running.
Verdict: Sophos continues to make improvements in their products and the XG135w is no exception. If you are running other Sophos software, this is a must have.
Verdict: While Splunk isn’t typically thought of as a security tool, this is worth taking a look at if you already implement Splunk inside your environment – and even if you don’t.
Editorial Staff Blogs
Best Practices for Dealing with Phishing and Next-Generation Malware
Phishing and malware threats are skyrocketing as cybercriminals become more adept and stealthier in penetrating IT security defenses. Read this white paper to learn how users can...
How to Transform Employee Worst Practices into Enterprise Best Practices
Download this whitepaper to learn the Top 10 enterprise security employee best practices, as well as clear direction on how to go about improving your organization’s security posture...
Osterman White Paper: Supplementing the Limitations in Office 365
This Osterman Research White Paper examines what’s currently available in Office 365 and addresses security, archiving and content management, and GDPR compliance limitations.
Annual Threat Report: 2017 Summary & 2018 Predictions
Download the report to learn what attacks targeted midsized organizations in 2017 and how to protect your business against continued attack trends through 2018.