AlienVault Unified Security Management Platform

AlienVault, the company with the cool logo, has really outdone themselves with the Unified Security Management Platform (USM).

CorreLog SIEM Correlation Server

This one leads two lives: a SIEM in its own right or a tool that can work alongside other, perhaps larger, SIEMs.

EventTracker Security Centre

Excellent value and wide-ranging capabilities perhaps unexpected in such a modestly priced package.

LogRhythm Security Intelligence Platform

Probably the most complete pure-play SIEM we’ve seen with the added benefit of many next-gen features and superlative correlation and analytics.

McAfee Enterprise Security Manager

Probably the most comprehensive and powerful SIEM we’ve seen, continuing the legacy of the old Nitro product up to the present time.

WatchGuard T30W and WatchGuard Dimension

The T30-W is a UTM for small- to medium-sized organisations. Used with Dimension it provides most of the functionality needed for today’s threatscape.

Bayometric Touch N Go

Bayometric does have many kinds of fingerprint scanners available for sale, it primarily is the developer of a fingerprint recognition API.

Datablink Device 200 and Mobile 200

The idea behind Datablink is that you pair up your device or mobile phone with a screen that is presented from a server online.

PistolStar PortalGuard

PortalGuard is a dedicated web-based portal that provides all strong authentication for the assets it supports.

SafeNet Authentication Service

SafeNet Authentication Service is a SaaS offering, but it can be set up on-premises if desired.

SecureAuth IdP

SecureAuth IdP is a specialised web server that can act as a portal with strong authentication tied to the applications or web/cloud locations to which it allows connections.

Vasco DigiPass 780, DigiPass for Mobile, and Identikey Authentication Server

This suite addresses malicious actors and can intercept and decode online banking transactions.

Yubico YubiKey 4

The YubiKey is an odd, little touch-sensitive second-authentication factor.

BeyondTrust PowerBroker and Password Safe

PowerBroker and Password Safe from BeyondTrust are the privileged account management components that sit on top of the much larger BeyondInsight platform.

Bomgar Privileged Access Management and Bomgar Vault

Bomgar Privileged Account Management and Vault is an agentless, proxy-based appliance that helps secure privileged account access and monitor systems accessed with those accounts.

CA Technologies Privileged Access Manager

Privileged Access Manager from CA Technologies is an appliance-based access gateway for securing access to systems using privileged accounts.

Centrify Privileged Identity Management

The two components of this tool make for a solid privileged account management platform to secure access to crucial accounts both on the enterprise network but also in the cloud

CyberArk Privileged Account Security Solution

The CyberArk Privileged Account Security Solution is an entire account management platform that combines a password vault with strong controls and real-time threat detection.

Hitachi ID Privileged Access Manager

The Hitachi ID Privileged Access Manager is a more traditional privileged account manager product with some really great features and functionality.

Lieberman Software Enterprise Random Password Manager ERPM

The Lieberman Enterprise Random Password Manager provides a secure repository for storing and managing access to privileged accounts and their associated passwords.

ManageEngine Password Manager Pro

Password Manager Pro from ManageEngine provides simple and easy-to-deploy password and access management to privileged or system accounts.

NetIQ Privileged Account Manager

The NetIQ Privileged Account Manager offers a four-tiered approach to managing privileged access.

Netwrix Auditor

The Netwrix Auditor takes an interesting yet vital approach to managing privileged accounts: Information is key.

Pleasant Solutions Pleasant Password Server

The Pleasant Password Server from Pleasant Solutions provides a secure password vault and privileged account password management that leverages KeePass technology to expand web-based sign-on functionality to the enterprise.

Thycotic Secret Server

Secret Server from Thycotic offers highly scalable distributed privileged account management.

Wallix AdminBastion Suite

The AdminBastion Suite from Wallix takes a very interesting approach to privilege account management and access.

Rapid7 UserInsight

Rapid7 has been in the vulnerability game for a long time and now have gotten into the active detection game.

Attivo BOTsink

This is a high interaction honeypot on steroids.


This product – with its objective of defeating persistent malware – is a fit for active breach detection.

Fidelis XPS

There really is little, if anything, that XPS cannot do in the digital forensics detection, analysis, prevention and response arena.

GuardiCore Data Centre Security Suite

The GuardiCore suite exhibits characteristics of both active breach detection and threat deception plus a whole lot more.

illusive networks illusive

illusive is a very cool products that has as its main purpose focusing on the actors rather than the malware in an attack.

LightCyber Magna

LightCyber provides us with a behavioural attack detection tool.

TrapX DeceptionGrid

The whole focus of TrapX is based on operationalising deception as a defensive activity.

Vectra Networks XSeries Platform

This is an active breach detection tool with a very particular focus: malware, most especially APTs.

Acuity Risk Management STREAM Integrated Risk Manager

STREAM is an integrated risk management tool delivered as a software product consisting of a database server, an application server and a client component.

Agiliance RiskVision

This is a hybrid application. It has many of the aspects of a traditional GRC platform and many of the technology-centric attributes. But, for all of that, it is biased toward risk management, albeit with many other GRC trappings.

AlgoSec Security Management Suite

This is a very specialised product. Its premise – and a good one it is – is that the firewall(s) manage the risk in any system.

Allgress Insight Risk Manager

This is an interesting product. It focuses on taking GRC into an IT environment and aligning it with business priorities to manage security and compliance.

FireMon Security Intelligence Platform

FireMon Security Intelligence Platform is focused on monitoring and managing firewalls.

MetricStream Risk Management Application and Policy and Document Application

This is a modular application delivered as SaaS or on-premise.

Modulo Risk Manager

This is a traditional approach to GRC with the added benefit of being able to consume vulnerability data from third-party scanners.

RSA Archer GRC

The RSA Archer GRC is a platform that integrates with a number of modules such as policy management, vulnerability risk management and content library.

Rsam GRC Platform

Rsam is undeniably a traditional GRC product but with a few nice twists.

Skybox SecuritySkybox Enterprise Suite

Skybox Enterprise Suite is strongly focused on the risk part of GRC.

SolarWinds Network Configuration Manager

The Network Configuration Manager takes everything that SolarWinds does well and wraps it in a cloak of GRC functionality.

Tripwire Enterprise

Tripwire Enterprise is a security configuration and change management tool.

Trusted Integration TrustedAgent GRC

TrustedAgent GRC is risk-focused and takes a decidedly traditional GRC approach.

Tufin Orchestration Suite

Tufin Orchestration Suite is a tool that decidedly is on the technical side of GRC management.

AccessData Forensic Suite

We have been using AccessData tools for years and they never disappoint.

CRU Ditto Forensic FieldStation

This is a simple tool but it may be one of the most important in your kit.

Guidance Software EnCase 7.10

EnCase has a long history in law enforcement and, in recent years, has moved strongly into the corporate world.

Distil Networks

Distil inspects each http request in real time to determine if it is a malicious bot.

IntaForensics Lima Forensic Case Management

This should be in every digital forensic lab, especially those that need to track evidence for use in court.


XRY Office is a mobile device analysis tool, unusual in that it is very strong in recovering forensic data from devices that are locked without having to know the unlock code.


PacketSled is a cloud-based breach detection and network forensics tool that provides real-time detection of threats as they cross the wire, and retroactive investigation of host activity including the application of new indicators to historical data.

Cellebrite UFED Series

We are looking at three powerful tools in the UFED series: UFED 4PC Ultimate, UFED Link Analysis and the new UFED Cloud Analyser.


This product is the poster child for next-generation anti-malware.

DeviceLock Endpoint DLP Suite

The Swiss Army knife of endpoint security.

ESET Endpoint Security

ESET Endpoint Security is one of the products that does a lot of different functions.

Guidance Software EnCase Endpoint Security

EnCase Endpoint Security really has two parts: Threat Detection and Incident Response.

Invincea Advanced Endpoint Protection AEP

Advanced Endpoint Protection (AEP) is a very competent anti-malware tool that really focuses on the task at hand: protecting the endpoint from malware threats.

Pulse Secure PulseWorkspace

Pulse Secure PulseWorkspace is just for mobile device endpoints. It functions on iOS or Android and, as we are seeing more frequently, it depends on containerisation.

Raytheon Websense SureView Insider Threat

SureView Insider Threat is largely an investigative platform.

SentinelOne EPP Endpoint Protection Platform

SentinelOne EPP (Endpoint Protection Platform) is an anti-malware approach to endpoint security on Windows, OS X and Android devices.

ThreatTrack Security VIPRE Business Premium

VIPRE Business Premium is one of the endpoint products that focuses on malware and it does it well.

Trend Micro Smart Protection Complete

Being Trend Micro - a well-known anti-malware vendor - one would expect the Smart Protection Complete suite to be an enhanced anti-malware product.

Adallom Cloud Application Security Platform

This cloud access security broker supports a huge number of cloud applications and is simple to deploy and seamless to users.

Alert Logic Cloud Defender

This suite of tools from Alert Logic protects data in multiple locations, including on-premises.

Bitglass Enterprise Edition BEE

The heart of Bitglass Enterprise Edition (BEE) is digital rights management (DRM).

Elastica CloudSOC Platform

CloudSOC is a new security stack defined for the cloud, residing in the cloud and provisioned from the cloud.

FireLayers Secure Cloud Gateway SCG

FireLayers Secure Cloud Gateway (SCG) is another approach to securing applications in the cloud.

Illumio Adaptive Security Platform ASP

Stops the spread of attacks with security that enforces precise inbound and outbound communications on every workload based on natural language policies for application interactions.

iSheriff Cloud Security

Integrated security management tool deployed in the cloud.

Lumeta Enterprise Situational Intelligence ESI

Provides situational awareness of network architecture, segmentation and cyber-security, supporting decision-making impacting security and compliance relating to cloud or virtual environments.

Palerra LORIC

Combines security configuration management, threat detection, predictive analytics and automated incident response for cloud assets from branded applications, such as Microsoft Office 365, to infrastructure, such as AWS.

Perspecsys AppProtex Cloud Data Protection Platform

Addresses compliance, security and privacy issues for cloud-based applications.

Bitdefender GravityZone

We like a product that actually is a solution. Solution is one of those hype-laden marketing buzzwords that says, “We’re not sure why you need this but it’s a solution.”

Catbird Insight

The problem this tool is addressing is twofold: lack of visibility in the cloud and inefficient security controls.

HyTrust DataControl

The silver bullet of data security is encryption. Simple, right? Not so fast…there are several issues, especially in a virtual environment, that make that simple statement a little more difficult in practice.

Kaspersky Lab Security for Virtualisation

Kaspersky has built itself up from a purveyor of anti-virus software to a full-blown security management company and has now moved into the virtual environment with this offering. Right from the first, we were impressed.

Menlo Security Isolation Platform

We’ve seen user isolation in the cloud before and some of it is very effective. Typically, users are directed to a cloud service that spots malware and then refuses to deliver content that is infected.


Cloud-based file-sharing and collaboration services are the bane of most organisations because they are not, of themselves, secure.

Boldon James Classifier v3.7

The Boldon James Classifier bundle is a comprehensive data leakage prevention solution that is easy to implement in organisations large and small.

Code Green Networks TrueDLP

Code Green Network's TrueDLP product is an extremely effective solution to data leak protection.

Identity Finder Sensitive Data Manager

Identity Finder Sensitive Data Manager takes a robust approach to data leakage prevention, offering maximum security across almost any networked device.

TITUS Classification Suite

TITUS Classification Suite approaches data classification in a unique way: By giving power back to the user while double-checking with automated analysis.

Varonis DatAdvantage and Data Classification

Varonis DatAdvantage and the Data Classification Framework work to identify where any and all of your sensitive and proprietary information lies.

Gemalto SafeNet Authentication Service

SafeNet Authentication Service is a cloud-based authentication service that uses a wide range of tokens and custom agents to support multifactor authentication to include one-time passwords generated by a phone app, SMS, a hardware token or email.

Deepnet Security DualShield v5.8.1

DualShield is an enterprise-grade, unified, multifactor authentication platform that protects all commonly used business applications with a large selection of multifactor authentication methods.


DIGIPASS 760 is a trusted hardware device for visual transaction-signing that creates a secure optical communication channel between the end-user (client) and the organisation (server).

Entrust IdentityGuard

Entrust IdentityGuard is a dual-factor authentication server, app, smart card manager, biometrics server and general jack-of-all-trades when it comes to dual-factor authentication.

Imation IronKey F200 Flash Drive

The Imation IronKey F200 Flash Drive is a simple, easy to set up and extremely secure device for users who need to transport confidential data between computers.

Cyphercor LoginTC

LoginTC from Cyphercor is a cloud-based solution that uses a mobile device or a desktop for authentication. It has easy-to-use iOS, Android and Chrome desktop applications to approve logins to a variety of products.

PistolStar PortalGuard

PortalGuard is a multifactor authentication, web-based single sign-on (SSO) through internet information services (IIS) and self-service password reset server and application rolled into one.

RSA Authentication Manager

The RSA Authentication Manager is a dual-factor authentication system designed from the ground up for enterprise deployment.

SecureAuth IdP

SecureAuth IdP is an identity provider – with a unique approach to securing user access control.

Swivel Secure Swivel Appliance

The Swivel Appliance is a competitive solution for two-factor authentication methods for clients searching for a secure product.

BeyondTrust UVM20 Security Management Appliance

The BeyondTrust UVM20 Security Management Appliance is the preconfigured hardware offering of Retina CS Enterprise Vulnerability Management.

SC Webcasts UK

Sign up to our newsletters