Verdict: Bitdefender is a modern endpoint security solution with all of the latest security technologies to compete at the top in this space. With the flexible options and wide array of supported endpoint operating systems, if you do not need an endpoint security solution to include mobile support, give this product ...
Verdict: Great intuitive cloud platform with an armament of modern security technologies with a quick implementation into your business environment.
Verdict: With the addition of real-time response to the EDR module, this product becomes even more attractive. If you aren’t using CrowdStrike, you really need to take a good hard look at Falcon.
Verdict: Solid implementation for this next-gen solution with top-tier EDR functionality. If you are looking for a new solution, this should be one to consider.
Verdict: At a low price point and unique security AI assistant, this product is worth checking out if you don’t need a cloud management solution.
Verdict: If you are looking for an on-premises solution that uses low resources and is robust with non-security features such as asset management and remote troubleshooting, you should demo this product.
Verdict: Kaspersky continues to be a strong contender in this field.
Verdict: There are good reasons why this solution has been a leader for so many years.
Verdict: Good solution with some unique features. If Linux is in your environment, this tool deserves a serious look.
Verdict: With the wide range of features that scales well with any size environment and the number of report templates, this product is worth testing out.
Verdict: A rich feature set for a great price. This product is this month's “Best Buy”.
Verdict: We have seen this solution implemented in multiple tools and we can see why. This is our Recommended Product this month.
Verdict: Good tool for experienced users, may take a bit for newcomers to get into the swing of it.
Verdict: Tenable has been one of the big names in this space and continues to deliver an amazing solution at a great price.
Verdict: While the interface is a bit dated, it’s still a great tool at a great price.
Verdict: AlienVault continues to be an amazing UTM solution for businesses of all sizes.
Verdict: CorreLog’s SIEM Correlation Server software is a full-feature solution at an amazing price point. We feel that this solution will compliment any security team big or small.
Verdict: If your organization has 20 or 2,000 assets, EventTracker 9.0 can help improve your information gathering and decision-making process and shorten incident response times. If you haven’t looked at EventTracker 9.0, you should.
Verdict: FortiGate products have come a long way and the FortiGate 501E shines above the competition. If you are looking for a mid to large enterprise level Firewall that packs a punch with competitive pricing, check this out.
Verdict: LogRhythm has always been one of the top names in this space, and the new version continues to showcase why it needs to be considered part of your SOC.
Verdict: This solution is very customizable and requires very little knowledge to get up and running.
Verdict: Sophos continues to make improvements in their products and the XG135w is no exception. If you are running other Sophos software, this is a must have.
Verdict: While Splunk isn’t typically thought of as a security tool, this is worth taking a look at if you already implement Splunk inside your environment – and even if you don’t.
Verdict: Whether you are adding an appliance to your already outfitted WatchGuard environment, or you are in the market for your first midsized UTM the Firebox M470 should be on your list to consider.
Verdict: Catering to no-frills, quick implementation expectations, this solution also delivers a modern approach with their instant-chat support available with one click.
Verdict: CrowdStrike Falcon continues to be a sophisticated toolset that focuses on all three phases of a malware attack. The cloud-based management dashboard provides very detailed information to help identify threats and remove them from your assets. If your organization puts a high value on information, this product should be near ...
Verdict: A very complete product that delivers on all levels. enSilo offers a strong Next-Gen AV paired with Application Communication Control and Endpoint Detection and Response solutions.
Verdict: Recommended solution to fit into your layered security approach to solve phase 1 of the ransomware stack. This specialized solution would be a great addition to any organization taking steps to protect the email threat vector.
Verdict: This reliable name has the depth and scope to address the needs of any-sized organization. With a variety of support options, this platform is ready for simple or complex deployments.
Verdict: If you don’t want to limit yourself to a single toolset, this solution provides a wide variety of technologies from which to choose.
Verdict: This is a strong product and, complicated as it might appear on the surface, there is a lot of help to get you going and to get the tool functional and producing useful output. This is one of our Recommended products for the month.
Verdict: While we liked this product, there are peripheral aspects that need some cleanup. Pricing seems reasonable but if you have a lot of packages it could get expensive. In any event, it certainly is well worth your time to give it a closer look. We make this one of our ...
Verdict: This is the 800-pound gorilla in this space. It has just about everything – and what it doesn’t have it certainly soon will. We make this our Best Buy this month.
Verdict: This one really demands your attention if you are working in a hybrid environment. We have seen nothing that quite compares and the technology used is both unique and innovative. For its hybrid focus, this is one of our Recommended products this month.
Verdict: While this is not a true next-generation tool, neither is it a traditional one. This is one of those unique products that have, truly, carved its own niche and it has done that quite well.
Verdict: Tufin is a progressive and capable vendor in this space. We have watched their product evolve over the years and it is very good example of the next generation risk and policy management genre.
Verdict: This is a capable tool and meets its objectives well.
Verdict: For a pure-play GRC this is about the most solid product we’ve seen. If GRC is what you want, and you need next generation, look at this one. We predict you’ll like what you see.
Verdict: This always has been one of our top picks over the years. This year it did not disappoint us, even though it has moved to a new home. We make this our Recommended traditional products this month.
Verdict: When it comes to change management it is hard to beat this tool. But along with that, it is a very competent cyber risk management platform. Well worth your time, even if you have other GRC tools that it can work alongside. This is our next generation Recommended tool this ...
Verdict: This one is worth a close look. It has all the tools you need to manage the security on your enterprise and it is very straightforward to use.
Verdict: As a traditional GRC, this one demands your attention for its price vs. performance and flexibility. As you add modules the price will climb, of course, but the basic starting point is very reasonable.
Verdict: For a next generation tool this one cannot be beat for the price. It is solid, comprehensive and the user interface and drill-downs are clean and well thought-out. For its price and performance we make this one our Best Buy this month.
Verdict: FTK will continue to be our computer forensic workhorse and we make it SC Lab Approved for another year.
Verdict: This belongs in every lab doing mobile device forensics. Not only is it a solid tool, it is perfect for triage. We make this our Best Buy this month.
Verdict: We wish that we could afford this tool for our lab but, as powerful as it is, it is far out of the range of any but large organizations with significant investment in forensics and DFIR.
Verdict: This has become a mainstay in the lab for tracking research projects, all of which behave a lot like digital forensic investigations. Over the past year we have not retained our research records because there was no need to. This year, need or not, we will. We make this ...
Verdict: While monitoring remote sessions may not be the first thing you consider when you are planning DFIR, if you are accessing servers and critical/sensitive workstations remotely you should consider this product strongly, no matter what the size of your enterprise is. This is our Recommended product for this month.
Verdict: This is probably the best analytics tool we've seen and the notion of feeding with a SIEM is intriguing for its significant possibilities. We certainly will be doing that here in the Labs. NIKSUN has been SC Lab Approved since we started the program and we continue that for another ...
Verdict: Solid malware analysis tool, especially good for engineers just getting started with malware analysis. We make this our Recommended tool for this month.
Verdict: Since this is SC Lab Approved, the obvious verdict is that it is a first-rate tool and merits examination if you are looking at doing in-house malware analysis (and you should be). We continue to rate this one SC Lab Approved for its heavy utility in our lab and superior ...
Verdict: We have gushed about this tool enough in the review so we’ll simply offer a verdict of Best Buy for this month.
Verdict: For a mix of threat analysis and incident response – where the core of the alert is malware-based – this one demands your attention. The Carbon Black experience is obvious.
Verdict: This is a strong product under the covers but with a few warts for users. None of those are show-stoppers, though, and you would do well to take a close look at it.
Verdict: This is a very sophisticated but rather specialized tool for the endpoint. If you are a large organization or one with high-value information assets, this is well worth your time. For what it does, we know of no better tool available. We make this our cloud-based Recommended product.
Verdict: If you are using CylancePROTECT this is a no-brainer. If you are not, it’s a good reason to consider it. Because CylancePROTECT is one of our SC Lab Approved products, it already has our highest rating, but we are naming the OPTICS add-on Recommended for the value that it adds ...
Verdict: If you’re looking for a threat-focused endpoint tool at an attractive price point this is worth your attention. For its ease of use and deployment, we make this our on-premises Recommended tool.
Verdict: This is one of the strong players in this field. Although it shows, clearly, a legacy of anti-malware (to the point where it still refers to “anti-virus,” even though it really addresses all malicious software), this tool is a capable contender for endpoint security in general.
Verdict: An exceptional effort on behalf of the McAfee technical support team that provided the SC Lab with the opportunity to dedicate more time to testing the product package. Overall, an excellent product, but you’ll get the most out of it as part of the entire McAfee suite managed, as ours ...
Verdict: Don’t pass this one by if you are looking at anti-malware. In our view, it certainly ranks in the top five such products we’ve seen over the past couple of years.
Verdict: You cannot make an informed endpoint decision without taking a look at this. Of course, if you already are a Symantec shop this will fit right in.
Verdict: Solid vulnerability management tool that could become a bit pricey in a large environment.
Verdict: This one demands your attention. At a very reasonable price point, we make this our Best Buy this month.
Verdict: This is a tool that you can add to your environment almost regardless of what else you are using. It not only plays well with others, such as risk management tools, it is a powerhouse in its own right. Recommended.
Verdict: Well worth your time. This is a company with solid experience in the technology – and it shows.
Verdict: We weren’t sure about this one until we acclimated to how it really works (as opposed to how we thought that it should work). Given that this truly is a beast of a different color, we are classing it by itself and a vulnerability analytics and workflow management tool and ...
Verdict: This one demands your attention. With its ability to cut through vulnerability noise, using its analytics and configuration options to its massive scalability, this works for just about any size enterprise.
Verdict: Not much to say here besides that this product is SC Lab Approved and that is our highest award. This is one of the best UTMs we’ve tested and over long periods of use it has delivered very well. We make it SC Lab Approved for another year.
Verdict: Especially for organizations with limited expertise in applying all of the things a SIEM can do to protect their enterprises, this product is a must-see. However, any size organization can benefit by considering this as part of its security stack.
Verdict: There is a lot to getting this one up and running, but once it’s up and you have the things you want to monitor plugged in, this one of the most complete SIEMs we’ve seen.
Verdict: We like this a lot, especially for SMBs, although larger organizations certainly should not rule it out as too small. It’s not. For its value and feature set, as well as the efforts to improve and keep the product ahead of the curve, we make this our Best Buy.
Verdict: Since this already is SC Lab Approved, we can’t give it a higher rating. We like this well enough that we are extending its SC Lab Approved designation for another year. It continues to be our key analysis tool.
Verdict: This is an important contender for your SOC SIEM. It will take data from just about anything you need to monitor and it includes solid third-party threat feed access. This is our Recommended product.
Verdict: This demands your attention no matter what size your organization. There are models to cover most requirements.
Verdict: This is a product with which you pretty much can’t go wrong, especially since it integrates with most products that need the log management and analysis that it does. It is sort of a SIEM’s SIEM.
Verdict: This is an excellent approach to first phase interdiction for ransomware attacks and shows a solid understanding of the ransomware process and how to manage its delivery through phishing.
Verdict: This is a solid anti-ransomware tool, priced right and well-supported. It certainly deserves your attention. We make this our Recommended product for multi-featured products this month.
Verdict: This is absolutely a world-class anti-ransomware product in a world-class ecosystem. Using the associated products, you can build out a solid security framework in your enterprise. For its completeness and solid competence, we make this our Best Buy this month.
Verdict: A promising product not quite ready for prime time.
Verdict: This is not for the faint-hearted, but if you opt for this you can be assured that it and Barracuda will serve you very well, indeed.
Verdict: Because this is a rather specialized approach to the ransomware problem and, in our experience, one of a very small handful of services that get this right, we make this one our Recommend product for specialized products this month.
Verdict: Solid threat intelligence product with a prodigious collection of resources. Fits well into just about threat and intelligence analysis tool set. At a price that is hard to beat, we make this our best Buy.
Verdict: In a sensitive environment – such as a financial institution that can afford the resource – this is a very solid contender. There is a whole lot to like about it and it may be one of the most powerful tools on the market.
Verdict: This is a good tool and certainly has a place in your analysis stack.
Verdict: We wish that Cyjax would use humans instead of computers to probe underground forums. Also, this is a bit pricey for what it offers. However, if you need open source intelligence with a bit of closed source thrown in, this is well worth your time to examine.
Verdict: If you need this level of analysis and if you can afford it, this is a solid choice for your cyber intel arsenal. We make it our Recommended choice.
Verdict: This has long been one of our favorite products and it is well worth considering.
Verdict: Good, well though-out tool and, if you are looking for out-of-the-box compliance capabilities, this one demands your attention.
Verdict: A powerful tool with a clear and important mission that it fulfills well. We make this our Recommended product this month.
Verdict: This is one of the best tools of its type that we’ve seen. It is comprehensive, reliable and easy to use. We make it our Best Buy.