Katelyn Dunn, Author at SC Media

Katelyn Dunn

Most recent articles by Katelyn Dunn

SC Product Reviews: Identity & Access Management

This month, SC Labs assessed several identity and access management solutions. This review comes at a relevant time with the recent events surrounding COVID-19 and the global shift to working from home. The traditional, known perimeter has grown increasingly immaterial over the years. The unprecedented, world-wide scramble to work remotely has emphasized that the previously…

Vulnerability management

A well-run vulnerability management program removes the guesswork, says Katelyn Dunn. his month, we revisited a mixture of familiar and new faces. Vulnerability management is such a basic security element that occasionally it gets overlooked. However, these tools should be a staple in every security arsenal by now. In some cases, organizations may deploy more…

SC Product Reviews: SIEM

This month, SC reviewed several Security Information and Event Management (SIEM) solutions. Although we have tested these products before, we are impressed with the development and innovation that occurs year after year. SIEM capabilities have expanded well beyond security and event management. They drive threat detection and response with auto-remediation and guided responses based on…

SC Product Reviews: Data loss prevention

Securing data has become a labor-intensive task due to tremendous increases in volume and the far-reaching vectors it traverses. Only recently have compliance standards and frameworks cracked down on information security practices and most organizations still do not sufficiently monitor their data or control its accessibility. The aggressive changes in security protocols and tightened compliance…

SC Labs product reviews: Email security

The use of collaborative tools and technologies is on the rise with email topping the list. That explains why it faces such relentless attacks. Email communications are leveraged to keep businesses running efficiently, but unfortunately, is often overlooked when it comes to implementing adequate security measures. Tools in the past have focused mainly on spam…

SC Labs’ Product Reviews: Mobile device management and unified endpoint management

Mobile device management is a crucial component of maintaining a stable security posture, but mobile device management and unified endpoint management tools, one of the more difficult areas of cybersecurity is one of the most difficult areas of cybersecurity. The everchanging and growing threat landscape makes security difficult enough, while the lack of control surrounding…

Emerging Products: Breach and attack simulation technologies

Until recently, the critical task of security testing was primarily performed through time-consuming, costly and laboriously manual penetration testing. Organizations understood that, despite its expense and inefficiency, testing was – and still is – extremely important to security posture. The best security tools in a company’s arsenal mean nothing if they are improperly configured or…

AttackIQ Platform v2.15

Vendor: AttackIQ Price: $5,000 per Test Point Engine.Contact: attackiq.com What it does: AttackIQ Platform assists Red and Blue Teams by continuously testing different security measures in production systems in order to validate security controls using workflows and attack emulations. What we liked: How thoroughly the platform aligns to the MITRE ATT&CK Framework and the transparency…

Cymulate Breach and Attack Simulation Platform 3.30.16

Vendor: Cymulate Price: $40,000-$500,000 based on company size and number of attack vectors.Contact: cymulate.com What it does: Cymulate divides the attack surface into seven attack vectors and runs hundreds of thousands of customizable simulations on the entire kill chain to test an organization’s security posture and controls. What we liked: The focus on lateral simulations…

Picus Security Platform v2402

Vendor: Picus Security Inc.Price: $25,000 per assessment vectorContact: picussecurity.com What it does: Leverages continuous, metrics-based validation to harden security controls and provide mitigation suggestions. What we liked: The mitigation suggestions are remediations that have been tailored to an organization and its specific defense stack. Picus Security Platform takes a threat-centric approach to achieving cyber resilience…

Next post in Reviews