About Product Reviews
In our Group Test each month, we look at several products around a common theme based on a predetermined set of SC Labs standards (performance, ease of use, features, documentation, support, and value for money). There are roughly 50 individual criteria in the general test process. These criteria were developed by the SC Lab in cooperation with the Center for Regional and National Security at Eastern Michigan University.
The diligence and commitment to excellence made by these staff and other members of our editorial team have made our Product Reviews one of the most well-read sections of our magazine and website. As a result, they remain the most objective, thorough and best in the industry. For more information click here.
Verdict: Very intuitive, highly customizable, with the ability to make security as simple or granular as you wish with the various configurations. With compliance support, Outlook add-in, and ease-of-use ability makes it a worthwhile investment for anyone looking to secure their data.
Verdict: This is a great product for large environments, especially for those requiring GDPR support. It offers Windows and Linux support, giving it versatility. The customizability and security of the Multi-Cloud Data Encryption, and the unique raid like setup gives customers privacy assurance and flexibility.
Verdict: Great API-driven technology that integrates with Slack, Jira and Okta for SSO, also provides users concrete documentation and workflow suggestions. This is a strong contender in its space and worth a look.
Verdict: Beautiful dashboard with an amazing product behind it; a quality company and solution that you should keep an eye on.
Verdict: Bitdefender is a modern endpoint security solution with all of the latest security technologies to compete at the top in this space. With the flexible options and wide array of supported endpoint operating systems, if you do not need an endpoint security solution to include mobile support, give this product a demo.
Verdict: CrowdStrike Falcon continues to be a sophisticated toolset that focuses on all three phases of a malware attack. The cloud-based management dashboard provides very detailed information to help identify threats and remove them from your assets. If your organization puts a high value on information, this product should be near the top of your list.
Verdict: Recommended solution to fit into your layered security approach to solve phase 1 of the ransomware stack. This specialized solution would be a great addition to any organization taking steps to protect the email threat vector.