Executive Insight - Network Security

Product Reviews

IRONSCALES IronTraps

Verdict: This is an excellent approach to first phase interdiction for ransomware attacks and shows a solid understanding of the ransomware process and how to manage its delivery through phishing.

SC Magazine Recommended

Sophos Intercept X and Endpoint Protection

Verdict: This is a solid anti-ransomware tool, priced right and well-supported. It certainly deserves your attention. We make this our Recommended product for multi-featured products this month.

SC Magazine Best Buy

Trend Micro Smart Protection Complete

Verdict: This is absolutely a world-class anti-ransomware product in a world-class ecosystem. Using the associated products, you can build out a solid security framework in your enterprise. For its completeness and solid competence, we make this our Best Buy this month.

WatchPoint CryptoStopper

Verdict: A promising product not quite ready for prime time.

Barracuda Advanced Threat Protection BATP

Verdict: This is not for the faint-hearted, but if you opt for this you can be assured that it and Barracuda will serve you very well, indeed.

Mimecast Email Security Gateway with Target Threat Protection

Verdict: Because this is a rather specialized approach to the ransomware problem and, in our experience, one of a very small handful of services that get this right, we make this one our Recommend product for specialized products this month.

SC Magazine Best Buy

Anomali ThreatStream

Verdict: Solid threat intelligence product with a prodigious collection of resources. Fits well into just about threat and intelligence analysis tool set. At a price that is hard to beat, we make this our best Buy.

SurfWatch Threat Analyst

Verdict: In a sensitive environment – such as a financial institution that can afford the resource – this is a very solid contender. There is a whole lot to like about it and it may be one of the most powerful tools on the market.

Whitepapers

Exploits Explained: Comprehensive Exploit Prevention

90% of reported data breaches involve an exploit in the attack chain. Read this paper to learn about 23 exploit techniques used by cybercriminals, and compare how the mitigations...

Questions You Should be Asking Your Cloud Service Provider

When choosing cloud service providers, be sure to put them under the microscope by asking the right questions about how they secure your essential information.

State of Software Security – Developer Supplement

As ties between development and security grow closer, developers are tasked with hands-on security testing. This report helps developers by boiling down key takeaways they will be...

Best Practices for Dealing with Phishing and Next-Generation Malware

Phishing and malware threats are skyrocketing as cybercriminals become more adept and stealthier in penetrating IT security defenses. Read this white paper to learn how users can...

Sponsored Links