Group Tests
About Product Reviews
In our Group Test each month, we look at several products around a common theme based on a predetermined set of SC Labs standards (performance, ease of use, features, documentation, support, and value for money). There are roughly 50 individual criteria in the general test process. These criteria were developed by the SC Lab in cooperation with the Center for Regional and National Security at Eastern Michigan University.
The diligence and commitment to excellence made by these staff and other members of our editorial team have made our Product Reviews one of the most well-read sections of our magazine and website. As a result, they remain the most objective, thorough and best in the industry. For more information click here.
Group Test

Analyst1 v1.9
Verdict: Overall, security pros will find Analyst1 a comprehensive threat intelligence platform that Government organizations may especially appreciate because it can run on top-secret networks and portion mark everything according to classification and dissemination controls.

AT&T Alien Labs Open Threat Exchange (OTX)
Verdict: AT&T Alien Labs OTX serves as a useful threat intelligence resource for organizations of all sizes. Security pros will find it an easy-to-use threat intelligence product that will benefit any organization.

DarkOwl Vision
Verdict: Overall, security pros will find DarkOwl Vision a powerful research tool that lets analysts conduct searches on the dark web and around it. Those looking for more traditional threat intelligence products should consider leveraging DarkOwl alongside other threat intelligence solutions for a powerhouse security stack. DarkOwl is especially geared towards law enforcement agencies.

DomainTools Iris Investigation Platform v3.0
Verdict: Overall, security pros will find the Iris Investigation Platform a useful tool that invites collaboration, especially in analyzing the risk of an IP address or website.

EclecticIQ Platform v2.4
Verdict: Overall, security pros will find EclecticIQ Platform a threat intelligence platform built for analysts, offering them several tools geared towards maximizing efficacy and efficiency, a secure means of team collaboration, and an elastic search feature to help them mine and research threat intelligence data.

IntSights External Threat Protection Suite
Verdict: Overall, security pros will find IntSights External Threat Protection Suite a unique and powerful threat intelligence product that integrates with other solutions. While this product offers a lot of value to all who deploy it, we believe that larger organizations will find it a particularly useful tool.

LookingGlass Cyber Solutions, Inc. scoutPRIME 2020.2.K.25.66
Verdict: Security pros will find LookingGlass scoutPRIME a flexible product with many configurations that cover several use cases. It gathers all the inferred or verified CVEs across collections, giving analysts the ability to conduct passive vulnerability management and the geodata to conduct research on more granular data points and discover regions or countries of origin.

ManageEngine Log360
Verdict: Overall, security pros will find ManageEngine Log360 a powerful but resource-intensive product that manifests the ManageEngine ethos that threat intelligence should combine the strengths of many different sources, not depend on a singular capability.

Recorded Future Security Intelligence Platform v2020
Verdict: Overall, security pros will find Recorded Future Security Intelligence Platform a strong contender in the threat intelligence category, especially considering its robust integration catalogue and fully-documented API.

ReversingLabs Titanium Platform
Verdict: Overall, security pros will find the ReversingLabs Titanium Platform an exceptional threat intelligence product that delivers valuable information while maximizing actionability.

ThreatConnect v6.0
Verdict: Overall, security pros will find ThreatConnect a highly-customizable threat intelligence platform with powerful dashboards and effective, automated playbooks and a handful of customizable, out-of-the-box templates geared towards individual use cases.

Barracuda CloudGen Firewall F280 v8.03
Verdict: Overall, security pros will find the Barracuda CloudGen Firewall a sound, centrally managed, VPN-based UTM product that offers security as well as simple, drag-and-drop configuration functionality. We believe that this products offers an array of features that will help any organization willing to endure its moderate learning curve.

Fortinet FortiGate 1100E
Verdict: Overall, Fortinet FortiGate operates as an elite and comprehensive next-generation firewall product that meets the performance and security needs of hybrid IT architectures.

SonicWall TZ 600 POE
Verdict: Overall, SonicWall offers centralized infrastructure management in a single pane of glass and is an especially great option for those looking to add access points, phones, etc. without needing to supply additional power.

Sophos XG Firewall v18
Verdict: Overall, security pros will find Sophos XG Firewall an easy-to-manage, comprehensive UTM product that has extensive features to suit several use cases, including the latest TLS encryption standard.

Untangle NG Firewall v15.0
Verdict: Overall, Untangle NG Firewall combines an enterprise-type next-generation firewall with endpoint security capabilities and offers simplified administration at a price point accessible for small businesses and organizations with limited resources.

WatchGuard Firebox T80 vFireware OS 12.6.1
Verdict: Overall, security pros will find WatchGuard Firebox T80 an easy-to-use UTM product that offers fast performance and extensive visibility at an affordable price.

BlackBerry Spark
Verdict: Overall, security pros should consider BlackBerry Spark an ideal endpoint security solution for those in the business of building in-house applications.

FortiEDR 4.1
Verdict: Overall, we were impressed with Fortinet FortiEDR, especially considering it’s a relatively new Fortinet solution.

F-Secure Protection Service for Business, Computer Protection Premium 20.1
Verdict: Overall, F-Secure delivers rich event context that helps analysts quickly identify malicious processes and understand their behaviors.

McAfee MVISION Protect Plus EDR 10.7, 3.0
Verdict: Overall, security pros will consider MVISION Protect Plus EDR a particularly good option for enterprises that require a highly-scalable solution.

Microsoft Defender Advanced Threat Protection
Verdict: Overall, security pros will find Microsoft Defender ATP a holistic, unified endpoint security solution that addresses the entire set of security capabilities necessary to protect against the modern threat landscape.

SentinelOne EPP Jamaica#38 / Agent 4.0
Verdict: Overall, security pros will find SentinelOne EPP a solid, easy-to-use product that covers the spectrum of endpoint security expectations. Organizations in the MSSP market or large companies frequently involved in mergers and acquisitions will find this product ideal.

Sophos Intercept X Advanced with EDR
Verdict: Overall, security pros will Sophos Intercept X a worthy, easy-to-install endpoint security solution that adds expertise by delivering enriched contextual information without adding to security team headcount.

VMware Carbon Black Cloud
Verdict: Overall, security pros will find VMWare Carbon Black Cloud a solid endpoint security solution. The cloud-native platform stops all areas of malicious activities and turns detected behaviors into actionable prevention measures.

BlackBerry Spark
Verdict: Overall, security pros should think of BlackBerry Spark as an ideal endpoint security solution for those in the business of building in-house applications.

CrowdStrike Falcon 5.x
Verdict: Overall, security pros will find CrowdStrike Falcon a superb solution that does a great job of identifying suspicious behavior and delivering robust contextual event information.

Cybereason Defense Platform 20.1
Verdict: Overall, consider Cybereason Defense Platform a solid, low footprint endpoint security option that issues alerts immediately without interrupting normal internal system processes.

FireEye Endpoint Security v4.9
Verdict: Overall, FireEye Endpoint Security runs as a worthy contender in the endpoint security space. The seamless installation process lets FireEye coexist with other security products, offering the most value possible.

LogMeIn LastPass Identity
Verdict: This solution is particularly ideal for small to midsized businesses. However, anyone would benefit from adding it to their security toolset.

Microsoft Azure Active Directory (Azure AD)
Verdict: This is a popular end-to-end identity and access management solution that strongly focuses on security.

Okta Identity Cloud
Verdict: This is a flexible solution with an extensive integration network that covers every identity use case and provides financial benefits for businesses across any industry.

OneLogIn Trusted Experience Platform (TEP)
Verdict: This is a solid identity and access management solution that bridges cloud, on-premise, and legacy applications with hybrid support.

Simeio Identity Orchestrator
Verdict: This is an extensible, standards-based platform that improves the identity and access management experience through automation.

Yubico YubiKey 5Ci
Verdict: YubiKey 5Ci offers the easiest and the highest level of security available for an identity solution that is so consumer friendly.

Beyond Security beSECURE 20.3
Verdict: Overall, Beyond Security beSECURE is a solid vulnerability management solution with robust automation capabilities and one-click integrations, reducing the manual effort security teams otherwise must put forth and allowing them to focus on remediation instead.

Carson & SAINT SAINT Security Suite 9.7
Verdict: Overall, SAINT Security Suite is a solid tool that has evolved nicely after many years of development. This is a particularly good option for those looking for an advanced environmental scanning tool.

Digital Defense Frontline Vulnerability Manager
Verdict: Overall, Digital Defense Frontline Vulnerability Manager makes it quick and easy to parse through accurate vulnerability data to extract specific information.

Kenna Security Kenna.VM
Verdict: Overall, Kenna Security Kenna.VM offers undisputed, evidence-based, real-time threat intelligence and risk scoring focusing on active exploits.

NopSec Unified VRM 5
Verdict: It focuses on lifecycle management to optimally inventory assets, detect vulnerabilities, prioritize risk, remediate concerns and validate existing security controls and remediation efficacy.

Rapid7 InsightVM 6.6.1
Verdict: Overall, Rapid7 InsightVM is a valuable vulnerability management solution and one of the better options we tested this month. It provides the visibility necessary to detect, prioritize and remediate vulnerabilities.

RiskIQ Digital Footprint
Verdict: Overall, RiskIQ Digital Footprint is a unique vulnerability management solution with an unparalleled breadth of data. It bridges internal detection with external intelligence to provide total visibility into franchise security posture.

RiskSense RBVM 8.15
Verdict: Overall, RiskSense RBVM is a noteworthy vulnerability management solution that empowers businesses with full visibility of threats and risk.

Tenable.io and Tenable Lumin
Verdict: Overall, Tenable.io and Tenable Lumin is a solid vulnerability management tool that provides unified visibility into assets and quantifies cyber risk to optimize vulnerability management.

Tripwire IP360 9.1.1
Verdict: Tripwire IP360 is a solid vulnerability management solution with a scalable enterprise architecture. It uniquely considers vulnerability age, risk and availability to pinpoint an environment’s greatest risks.

ZeroNorth The ZeroNorth Platform
Verdict: Overall, the ZeroNorth Platform offers a significant return on investment by optimizing other security tool investments, expanding the scanning portfolio, and maximizing time-to-value. Businesses large and small, particularly those interested in PCI compliance, will appreciate ZeroNorth’s scalability, as well as its actionable, prioritized integration with DevOps environments.
Group Tests
2019
2018
2017
2016
2015
2014
- Emerging products: Online fraud
- Emerging products: Data classification
- Application security
- NAC, IDM, DLP
- Email security
- Endpoint security
- Mobile device management
- Emerging products: Cloud security
- Risk & policy management
- Digital forensic tools
- SIEM
- Emerging products: Virtual system security
- Unified threat management
- Penetration and vulnerability assessment
- Authentication
2013
- Emerging products: Data classification
- Application and web security
- Identity management
- Emerging products: Online fraud
- Emerging products: Online fraud
- Email security/content management
- Endpoint security
- Mobile device security
- Emerging products: Cloud security
- Risk & policy management
- Digital forensic tools
- SIEM
- Emerging products: Virtual system security
- Unified threat managers (UTM)
- Vulnerability assessment tools
- Authentication
2012
- Database & application security
- Identity management, NAC and DLP
- Emerging products: Online fraud
- Email security & content filtering
- Endpoint security
- Emerging products: Cloud
- Mobile device security
- Risk & policy management
- Digital forensic tools
- SIEM
- Emerging products
- UTM
- Vulnerability assessment tools
- Multifactor authentication
2011
- Database security
- Application security
- Data leakage prevention (DLP)
- Encryption
- Identity management
- Network access control (NAC)
- Email content management
- Email security
- Portable device security
- Endpoint security
- Risk management
- Policy management
- Digital forensic tools
- SIEM
- Unified threat management (UTM)
- Anti-malware gateways
- Web content management
- Security Innovators Throwdown
- IDS/IPS
- Vulnerability assessment
- Multifactor authentication
- Biometrics
2010
- IP Security (IPsec) VPN
- SSL VPN
- Encryption in motion
- Encryption at rest
- Access management: Identity management
- Access management: NAC
- SIEM
- Forensics
- Endpoint UTM
- Gateway UTM
- Risk management
- Policy management
- Endpoint data leakage prevention
- Network data leakage prevention
- Anti-malware management
- Anti-malware gateways
- Email security
- Security Innovators Throwdown
- Patch management
- Vulnerability assessment
- Multifactor authentication
- Biometrics
2009
- Perimeter defense
- Analysis and testing
- Access control
- Special mention
- Virtualization
- Security infrastructure
- Data protection
- Group test: Policy management
- Group test: NAC
- Group Test: Fraud prevention
- Group Test: IDS/IPS MSS
- Group test: Portable device security
- GroupTest: Password management
- GroupTest: DRM & DLP tools
- GroupTest: Encryption tools
- Group Test: Smart cards
- GroupTest: Biometric tools
- Group test: Digital forensics
- Group test: Vulnerability assessment
- Group Test: Endpoint security
- Group Test: UTM
- Group test: Web content management
- Group test: Email content management
- Group Test: Multifactor authentication