SC Media First Looks | Product Reviews

First Look

First Look: Hyperproof Compliance Operations Platform

Company Name: Hyperproof Product Name: Hyperproof Compliance Operations Platform Basic Price: Professional Price Point of $100 per user/month (1-year commitment) What it does: A compliance operations platform that streamlines the compliance process for enterprises with a massive compliance frameworks library. What we liked: The Jumpstart feature that estimates how close the user gets to building…

First Look: Secure Data’s SecureDrive BT

Company Name: Secure Data Product Name: SecureDrive BT Basic Price: $250-$3,700 for 250GB to 8TB SSP What it does: A hardware encrypted storage device that unlocks wirelessly with a mobile device via Bluetooth. What we liked: The remote management-ready capability allows for total control over every aspect of the drive no matter where it’s located…

First Look: ReversingLabs Titanium Platform

Company Name: ReversingLabsProduct Name: Titanium PlatformBasic Price: Starting price is $10,000 for threat intelligence integrations and web offerings with volume-based pricing for large scale deployments.What it does: A machine learning hybrid cloud platform that harvests thousands of file types at scale to minimize threat detection lead time.What we liked: Detailed threat analysis of network traffic…

First Look: Guardicore Infection Monkey version: 1.7

Company name: GuardicoreProduct name: Infection Monkey version: 1.7Email: [email protected]: https://www.guardicore.com/Basic Price: Free, Open SourceCustomer Support Offerings:  For questions, suggestions and guidance join the Infection Monkey​ community via the Slack channel https://infectionmonkey.slack.com/​.  Guardicore Infection Monkey source code is available for direct download at the ​GitHub​ repository https://github.com/guardicore/monkey. During past year there have been a flood of…

First Look: MAFAZO Ignyte Assurance Platform

At a glance Product: Ignyte Assurance Platform Vendor: MAFAZOPrice: Subscription starts at $50,000What it does:  Automates control mapping for compliance frameworks.What we liked: Simple and straightforward user interface.The Bottom Line: Saves time for organizations managing multiple compliance frameworks. MAFAZO’s Ignyte Assurance Platform offering provides organizations with a broad view of compliance requirements and the gaps…

First Look: Sonrai Public Cloud Security Platform

Product: Sonrai Public Cloud Security PlatformVendor: Sonrai SecurityPrice: $100,000 billed annually. What it does:  Provides a cloud architecture risk map of all identity and data relationships, including activity and movement across cloud accounts, cloud providers and third-party data stores.What we liked: The broad open path view of the connections between cloud accounts, and databases that…

First Look: Capsule 8 Protect

Product: Capsule 8 Protect Vendor: Capsule 8 Price: Sliding scale based on number of concurrent servers. What it does:  Provides endpoint protection and response for Linux based production systems.  Offering targets enterprises operating production facilities that cannot slow down or stop. What we liked: Smooth workflow for managing many separate data points.  It facilitates rapid processing of large volumes of data…

First Look: YubiKey 5

Product Name: YubiKey 5Company: YubicoPricing: starts at $45 per key What it does: Provides one touch two factor authentication for a wide variety of platforms and websites. What we liked: Collaboration with Microsoft and Google delivers out of box integration with applications and platforms supported by these industry leading solution providers. The Bottom Line: The…

First Look: Corelight Sensor

Product Name: Corelight SensorCompany Name: CorelightPricing: Starts at $19,000 per year for physical appliances, and lower for VM or cloud deployments which are priced per Gbps. What it does: Transforms network traffic activity into context-rich, actionable detail for security monitoring teams.What we liked: Makes quick sense of traffic so incidents can be resolved faster, and…

First Look: Barac ETV

With the increasing trend of business services and applications leveraging encryption as the leading method of securing data in transit, malicious actors have once again adapted by developing more sophisticated attacks that employ the same technology. By using encryption to mask activities, bad actors can evade detection at organizations that lack the ability to inspect…

Next post in First Look