Executive Insight - Cybercrime

Product Reviews

SC Magazine Lab Approved

AlienVault Unified Security Management USM Appliance

Verdict: Not much to say here besides that this product is SC Lab Approved and that is our highest award. This is one of the best UTMs we’ve tested and over long periods of use it has delivered very well. We make it SC Lab Approved for another year.

EventTracker SIEMphonic

Verdict: Especially for organizations with limited expertise in applying all of the things a SIEM can do to protect their enterprises, this product is a must-see. However, any size organization can benefit by considering this as part of its security stack.

Fortinet FortiSIEM

Verdict: There is a lot to getting this one up and running, but once it’s up and you have the things you want to monitor plugged in, this one of the most complete SIEMs we’ve seen.

SC Magazine Best Buy

CorreLog SIEM Correlation Server

Verdict: We like this a lot, especially for SMBs, although larger organizations certainly should not rule it out as too small. It’s not. For its value and feature set, as well as the efforts to improve and keep the product ahead of the curve, we make this our Best Buy.

Whitepapers

SC Media eBook on Threat Intelligence

This eBook looks at threat intelligence techniques used to detect cyberespionage and provides recommendations on what companies can do immediately to reduce exposure. Threat intelligence...

Communicate Simply - Migrate Confidently

Simple conversations live at the heart of business. Level 3 Voice Complete lets you easily migrate to SIP, enabling you to have those conversations with customers, colleagues and partners...

Fragmentation: The "Silent Killer" of Your Security Management Program

Extreme fragmentation of enterprise security is contributing to the “Detection Deficit” between attackers and defenders reaching an all-time high. In this paper we’ll lay out a path...

Escaping the Malware Maze

How can the enterprise survive the daily onslaught of viruses and malware while building a long-term cyberdefense strategy to handle even bigger threats?

Sponsored Links