You searched for breach/ | SC Media

Your search for breach/ returned 50 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Group Test 1 remove

Your search for breach/ returned 50 results

Sort Results:

Relevant Recent
Product Review

PacketSled

PacketSled is a cloud-based breach detection and network forensics tool that provides real-time detection of threats as they cross the wire, and retroactive investigation of host activity including the application of new indicators to historical data.
Product Review

NIKSUN NetDetector Alpine

NetDetector Alpine v4.2 is the most up-to-date version of NIKSUN’s network traffic-monitoring hardware that audits and informs users of network security threats.
Product Review

SecurityScorecard

SecurityScorecard uses predictive AI analytics and a breach prediction algorithm to give an organization visibility into risk. It can rate any company in minutes, surpassing human validation, and globally locate company assets for digital footprint visibility. With a convergence of outside-in ratings, inside-out data and onsite audits, it provides tools and services to assist auditors…
Product Review

Tripwire Enterprise 8.7

Tripwire Enterprise ensures system availability and speeds up investigations through integrity monitoring that uses both agent and agentless methods to discover changes in real time before they become breaches and find the root cause of a compromise if a breach occurs. While the solution can be deployed physically, virtually on-premises or in the cloud, ultimately…
Product Review

GuardiCore Centra Security Platform

GuardiCore’s Centra architecture is based on three tiers. Collectors are deployed at the infrastructure level while agents are deployed at the guest level. An optional aggregation tier is installed only when agents are deployed, and centralized management and deception is usually provided as SaaS but can also be deployed on-premises. Native enforcement has Layer 4…
Product Review

Zecurion DLP 9

Zecurion DLP largely focuses on internal security, offering advanced forensic investigation and control features that detect policy violations, insecurely stored data, data usage and transfers. It immediately notifies security officers about security lapses, so teams can address and resolve issues quickly. The platform also protects intellectual property DLP and uses hybrid analysis. The robust monitoring…
Product Review

McAfee Total Protection for DLP 11.4

McAfee Total Protection for DLP protects Windows and Mac endpoints across more than 10 exfiltration vectors and offers additional blocking and monitoring capabilities for email and web traffic protection. It strongly emphasizes discovery, inventory and classification of personal data to give visibility and define what constitutes sensitive content. The solution has native and third-party options…
Product Review

Fidelis Cybersecurity Fidelis Network 9.2.4

The core of Fidelis Security is its patented technology, Deep Session Inspection (DSI), which scrutinizes the content of network sessions across all ports and protocols in real time to detect data policy violations, sensitive information and advanced threats. It processes, reassembles and iteratively decodes all packets for analysis. This recursive approach to information decoding lets…
Product Review

Digital Guardian – Data Protection Platform 7.6

Digital Guardian Data Protection Platform offers data protection independent of threat actors, data types, systems, applications, devices or points of access. This cloud-based model unifies endpoint detection, response and data loss prevention to protect against internal threats and accidental data theft, using the same agent. Endpoint detection and response protect against outsider threats and attackers…
Product Review

Code42 Next-Gen Data Loss Protection

Code42 Next-Gen Data Loss Protection offers centralized visibility and simplifies data risk detection and response through the collection of file content and metadata. It collects file content and user file activities from email-leveraging agents, endpoints and the cloud. The product protects and monitors cloud files through direct integrations with leading cloud collaboration platforms. Code42’s protective…
Next hm-product-review in Reviews