Executive Insight - Network Security

SC Fast Facts

Product Reviews

BeyondTrust Retina CS Enterprise Vulnerability Management

Verdict: Solid vulnerability management tool that could become a bit pricey in a large environment.

SC Magazine Best Buy

Digital Defense Frontline Vulnerability Manager

Verdict: This one demands your attention. At a very reasonable price point, we make this our Best Buy this month.

SC Magazine Recommended

SAINT Security Suite

Verdict: This is a tool that you can add to your environment almost regardless of what else you are using. It not only plays well with others, such as risk management tools, it is a powerhouse in its own right. Recommended.

Tenable.io Vulnerability Management

Verdict: Well worth your time. This is a company with solid experience in the technology – and it shows.

SC Magazine Recommended

Skybox Security Suite

Verdict: We weren’t sure about this one until we acclimated to how it really works (as opposed to how we thought that it should work). Given that this truly is a beast of a different color, we are classing it by itself and a vulnerability analytics and workflow management tool and ...

Tripwire IP360

Verdict: This one demands your attention. With its ability to cut through vulnerability noise, using its analytics and configuration options to its massive scalability, this works for just about any size enterprise.

SC Magazine Lab Approved

AlienVault Unified Security Management USM Appliance

Verdict: Not much to say here besides that this product is SC Lab Approved and that is our highest award. This is one of the best UTMs we’ve tested and over long periods of use it has delivered very well. We make it SC Lab Approved for another year.


The Rise of the Secure Internet Gateway

This white paper describes how security must evolve to protect users anywhere they access internet, why traditional solutions cannot address the gaps, and why new gateways represent...

2016 State of Software Security

This report provides security practitioners with tangible benchmarks with which to measure their own programs. Metrics presented are based on real application risk postures, drawn...

Fragmentation: The "Silent Killer" of Your Security Management Program

Extreme fragmentation of enterprise security is contributing to the “Detection Deficit” between attackers and defenders reaching an all-time high. In this paper we’ll lay out a path...

2016 DDoS Attack Trends

DDoS will likely be a problem that is here to stay, but understanding the latest trends can help you be better prepared. This paper explores the growing stateful attacks, and why...

Sponsored Links