Barracuda Web Application Firewall Model 660

starstarstarstarstar
The Barracuda Web Application Firewall is a hardware-based device which is used to monitor, assess and remediate web-based application vulnerabilities.

Fortinet FortiDB 1000D

starstarstarstar¾
The FortiDB 1000D is a hardware appliance that monitors, audits and identifies vulnerabilities in databases. There are three deployment options: network sniffer, native audit and network agents.

Identity Finder Sensitive Data Manager

Sensitive Data Manager ties discovery to business issues making classification easier and more relevant.

CA Data Protection Classification

This is a clean product with a well thought-out goal and a well-executed solution. It is part of the overall CA suite of access control products with which it integrates smoothly, and it offers dynamic classification and recognition.

Boldon James Classifier

Allows users to apply relevant visual and metadata labels.

TITUS Classification Suite

Provides classification for data, largely in a Microsoft environment, plus mobile environments.

RiskIQ Platform

Threat protection centered outside the firewall.

RSA Web Threat Detection

Detects anomalous behaviour on websites.

IBM Security Trusteer Pinpoint Criminal Detection

Account takeover detection and prevention.

White Ops Advanced

Provides evidence-based bot and malware detection with high certainty, in real-time, on any browser-based web request.

Avatier Identity Management Suite

starstarstarstar½
Besides automating user creation, the Avatier suite of products offers seamless integration with HR software, enables IT departments to set up a web portal for users to reset their passwords, and it can also create workflows so that high-level IT personnel aren’t bogged down with lower-level requests.

ForeScout CounterACT

starstarstarstarstar
The ForeScout CounterACT is a policy-based network access control product that allows for inventory, classification and regulation of endpoints and network devices.

Forum Systems Sentry API Gateway

starstarstarstarstar
The Forum Systems Sentry API Gateway is a comprehensive application security appliance that allows users to set up robust security over a variety of different protocols and data formats.

Hexis Cyber Solutions NetBeat NAC Enterprise

starstarstarstarstar
The Hexis Cyber Solutions NetBeat NAC is a well-designed network access control solution that can be deployed in minutes.

PFU Systems iNetSec Smart Finder

starstarstarstar½
The iNetSec Smart Finder from PFU systems is an excellent network access control system for organisations of any size.

Pleasant Password Server

starstarstarstarstar
Pleasant Password Server (PPS) is a simple yet effective way for organisations to manage their passwords everywhere.

McAfee Email Protection

starstarstarstarstar
McAfee Email Gateway protects networks from viruses, undesirable content, spam and other threats.

Axway MailGate SC v5.4

starstarstarstar
MailGate is a secure collaboration gateway appliance which combines email security and content management gateway functionality.

Barracuda Spam Firewall 400 v6.1

starstarstarstarstar
The Barracuda Spam Firewall is an integrated hardware and software solution designed to protect the email server from spam, virus, spoofing, phishing and spyware attacks.

EdgeWave ePrism Email Security v9.7

starstarstarstar½
EdgeWave ePrism offers a complete suite of email security services.

SafeT Data SafeT Box v5.1

starstarstarstar½
Safe-T Box is a secure email and data exchange solution comprised of three components offering high levels of security for secure email solutions.

WatchGuard XCS 580 v10.0

starstarstarstarstar
The WatchGuard XCS 580 (Extensible Content Security Appliance) is an easy-to-use, all-inclusive email and web appliance that provides security and privacy of inbound and outbound traffic.

Avira Endpoint Security

starstarstarstar¼
Avira Professional has its own console and is largely an anti-malware product.

CenterTools DriveLock v7.3

starstarstarstar¾
DriveLock offers dynamic, configurable access control for mobile drives, such as floppy disk drives, CD-ROM drives and USB memory sticks.

CoSoSys Endpoint Protector v4

starstarstarstar
Endpoint Protector v4 comes as a virtual appliance and is intended to provide device control, mobile device management and data leakage protection.

Fortinet FortiClient 5.0 for Windows v5.0.9

starstarstarstarstar
The tool includes an anti-virus module to scan system files, executables, dynamic-link libraries and drivers. It also scans for and removes rootkits.

Invincea Platform v3.3/4.0

starstarstarstar½
Invincea provides an additional layer of security at the endpoint by adding in protection for web browsing and document use.

Kaspersky Endpoint Security for Business

starstarstarstarstar
Kaspersky Endpoint Security for Business is an enterprise-grade endpoint security system that addresses malware, mobile device management, endpoint controls, encryption and systems management.

Dell KACE K1000 Systems Management Appliance v6.0

starstarstarstarstar
Addresses systems management tasks: device discovery and inventory, software distribution, patch management, software asset management (SAM), security audit and enforcement, service desk, power management and more.

Novell ZENworks Endpoint Security Management v11

starstarstarstarstar
Novell ZENworks Endpoint Security Management v11 hits all of the marks for a full-featured endpoint security product by addressing managing.

Safetica Technologies Safetica v5

starstarstarstarstar
Safetica manages and controls data security at the endpoint through its client-server architecture and three major components: Endpoint Client, Management Server and the Safetica Management Console.

Trend Micro Smart Protection Complete v11

starstarstarstarstar
Trend Micro Smart Protection Complete v11

Lumension Endpoint Management and Security Suite LEMSS v8.0

starstarstarstarstar
Unifies IT operations and security through a single console, server and agent architecture to address IT risk and systems management requirements across the enterprise.

ThreatTrack Security VIPRE Business Premium v6.5

starstarstarstar¾
Helps enterprises manage and control endpoint security by combining a small-footprint, anti-virus agent with integrated patch management and mobile device management (MDM) capability.

ADF TriageG2, Responder, Examiner

starstarstarstarstar
These three products are approximately the same type of tool, but with different functionalities depending on the market in which they are used.

Sophos Mobile Control v4.0

starstarstarstarstar
Sophos Mobile Control is an enterprise mobility management solution which offers mobile device management, mobile application management, mobile email management, mobile content management and mobile security and compliance through an easy-to-handle, web-based user interface.

BlackBerry Enterprise Service 10 BES10

starstarstarstarstar
With employees mixing personal and business applications on their mobile devices, parameters for security must be imposed. The product-set offers value for money.

MobileEther v2.0 by iboss

starstarstarstarstar
With employees mixing personal and business applications on their mobile devices, parameters for security must be imposed. This product is also considered very good value for money.

Mobile Enterprise Compliance and Security Server MECS v1.9.4.2 by M.A.D. Partners

starstarstarstarstar
With employees mixing personal and business applications on their mobile devices, parameters for security must be imposed. We find this product is very good value for money.

Acuity STREAM Integrated Risk Manager v3.1

starstarstarstar½
STREAM Integrated Risk Manager v3.1 from Acuity Risk Management is a risk-driven, compliance-monitoring and reporting solution that can log, track, remediate and report against multiple standards.

Agiliance RiskVision v7.0 HF1

starstarstarstarstar
Agiliance RiskVision v7.0 provides a holistic view of security and compliance in one integrated enterprise platform that enables companies to move from a reactive threat-driven approach to a proactive, risk-aware posture.

AlgoSec Security Management Suite v6.4

starstarstarstarstar
The AlgoSec Security Management Suite is an appliance-based policy management toolset for analysing routing tables, hit counters, log files and topology information from various firewalls, switches and routers.

Allgress Insight and Risk Manager v5

starstarstarstarstar
Allgress Insight and Risk Manager v5 helps companies aggregate data from security and compliance assessments and technical inputs and turn it into meaningful, actionable risk specific intelligence that can be aligned with the goals of the business.

Risk Analytics as a Service v4.1.0

starstarstarstar
Brinqa Risk Analytics is an IT risk management and vulnerability risk management platform that provides a consolidated view of an organisation’s risk factors. Handles Big Data very well, reporting, dashboarding and analytics.

Citicus ONE vR.4.0

starstarstarstarstar
Citicus ONE is an integrated system for organizations to automate their IT governance, risk and compliance management processes.

Aegify vMarch2014

starstarstarstarstar
Aegify from eGestalt Technologies is a subscription-based, cloud-delivered software-as-a-service (SaaS) solution for IT security monitoring and compliance management, vulnerability analysis and risk management.

FireMon Security Intelligence Platform

starstarstarstar½
The FireMon Security Intelligence Platform consists of a central security manager appliance fed via data collectors spread throughout the network.

Total Protection ToPS for Compliance v7.x

starstarstarstarstar
ToPS for Compliance and ePolicy Orchestrator (ePO) software is an extensible management platform that enables centralised policy management and enforcement of security products and the systems where they are installed.

Modulo Risk Manager v8.4

starstarstarstarstar
Modulo Risk Manager automates GRC processes, integrating different areas and activities and allowing for centralised reporting.

New Net Technologies Change Tracker Enterprise

starstarstarstarstar
Change Tracker Enterprise from New Net Technologies enables organisations to bring their existing environment into a state of policy compliance and then continually monitor and report on changes made once compliant.

Netwrix Auditor for Active Directory

starstarstarstar
Netwrix Auditor for Active Directory is a small piece of the much larger Netwrix Auditor Suite, which provides change and configuration auditing across a vast array of enterprise systems.

RSA Archer GRC Suite VRSA Archer GRC Platform 5.4 SP1

starstarstarstar½
The RSA Archer Risk Management GRC Suite v 5.4 SP1 provides an organisation with a consolidated view of its risk.

Rsam GRC Platform v 8.2

starstarstarstarstar
Rsam GRC v8.2 is a platform for risk management and security risk intelligence enabling organisations to perform risk assessments, manage compliance, threats and vulnerabilities, policies, remediation activities, issues, incidents and more.

Skybox View Enterprise Suite v7.0

starstarstarstar¾
Skybox Risk Control is part of Skybox View, a complete portfolio of proactive security risk management solutions that automatically find, prioritise risks and drive remediation in a large or complex network before an adverse event occurs.

TrustedAgent GRC V5.0.4

starstarstarstar½
TrustedAgent GRC v5.0.4 is an IT risk and governance tool modeled after the NIST 800-37 risk management framework – with two added steps that include define, categorise, plan, implement, assess, manage, authorise and monitor.

SolarWinds Network Configuration Manager

starstarstarstarstar
Network Configuration Manager from SolarWinds is a powerful tool for managing policy compliance across many network devices including routers, switches and firewalls.

Titania Nipper Studio

starstarstarstar
Nipper Studio from Titania is a newcomer this year to our policy management review.

Tripwire Enterprise and Tripwire DataMart

starstarstarstarstar
Tripwire Enterprise is a full-scale configuration management product that allows administrators to create master “known and trusted” configuration states for many types of systems and devices on the network.

Tufin Orchestration Suite

starstarstarstarstar
The Tufin Orchestration Suite feature three modules for managing security and compliance policies on network devices, such as routers, switches and firewalls.

Viewfinity Application Control

starstarstarstar½
Application Control from Viewfinity offers full-scale application policy that can be deployed right from a group policy within Active Directory.

Incapsula Enterprise

By proxying all users to a site via a secure content delivery system most, if not all, of the risks are virtually eliminated by this tool.

nCryptedCloud

nCryptedCloud adds a layer of encryption between the user and the storage provider.

Zscaler Security Cloud

This service forces users through the cloud instead of via direct access to an organisation’s internet portal.

Promisec Endpoint Manager

starstarstarstar¼
Promisec Endpoint Manager offers full agentless management and auditing of the many client computers on the enterprise network.

CRU Ditto Forensic FieldStation

starstarstarstarstar
Everything that one needs is in the case, including cables, adapters, a power brick and a space for extra disks.

EnCase Forensic

starstarstarstarstar
EnCase Forensic v7 is the latest incarnation of the EnCase computer forensic tradition.

Lima Digital Forensic Case Management Standard

starstarstarstarstar
The only pure digital forensic case management tool of which we are aware.

NIKSUN Alpine

starstarstarstarstar
This is a general purpose network forensic tool with a solid history.

ADF TriageG2, Responder, Examiner

starstarstarstarstar
These three products are approximately the same type of tool, but with different functionalities depending on the market in which they are used.

AccessData Tool Suite

starstarstarstarstar
We are reviewing this suite of forensic tools as a package the same way we did last year because the elements work well together and offer a complete set of computer forensic capabilities.

Cellebrite UFED Series of Tools

starstarstarstarstar
Cellebrite is, arguably, the number one mobile device forensic tool suite available.

AlienVault Unified Security Management v4.4

starstarstarstar½
AlienVault’s Unified Security Management product is an excellent introductory SIEM appliance.

BlackStratus LOG Storm v4.3.0.86

starstarstarstarstar
LOG Storm from BlackStratus combines log management and correlation systems with real-time monitoring and an integrated incident response system all on one easy-to-deploy and use appliance.

CorreLog Enterprise Server v5.4.0

starstarstarstarstar
System administrators looking to extend their logging capabilities, or security professionals needing to gain deeper insights into their computing environments, might start their search with the CorreLog Enterprise Server.

EiQ Networks SecureVue v3.6.6

starstarstarstarstar
SecureVue from EiQ Networks provides log gathering, correlation and analysis services for numerous operating systems, network and security devices, combining these services into a solid SIEM platform that offers vulnerability and compliance monitoring, incident management and configuration auditing in one easy-to-use package.

EventTracker Enterprise v7.5

starstarstarstarstar
This feature-rich tool is designed to meet the needs of organisations of all sizes. It hits all the marks for an enterprise SIEM.

HP ArcSight ESM v6.5c

starstarstarstarstar
HP’s ArcSight ESM is a mature product that collects events from virtually any source.

LogRhythm v6.2

starstarstarstarstar
Combining SIEM, log management, file integrity monitoring and analytics with powerful forensic tools, LogRhythm v6.2 offers security professionals a powerful monitoring and auditing platform to keep them informed, and an excellent investigatory tool in case things go wrong.

ManageEngine EventLog Analyser v8.6

starstarstarstar¼
The ManageEngine EventLog Analyser has most of the features you would expect in a SIEM, and supports more than 700 devices from 30-plus vendors.

McAfee Enterprise Security Manager v9.3.2

starstarstarstarstar
Enterprise Security Manager from McAfee is a truly enterprise-grade SIEM. Able to process thousands of events per second and store billions of events and flows, it offers great visibility into network activity for customers of any size.

NetIQ Sentinel v7.1

starstarstarstar¾
NetIQ’s SIEM helps to quickly identify and respond to threats and to simplify management and compliance reporting. It delivers scalable log collection, aggregation, correlation, and analysis and reporting capabilities through flexible deployment options.

SolarWinds Log Event Manager v5.7

starstarstarstarstar
The SolarWinds Log & Event Manager (LEM) offers a quality set of log management, event correlation, search and reporting facilities.

Deepnet Security DualShield v5.7

starstarstarstarstar
There are better paths to authentication than passwords, primarily using multifactor and biometric tools, says Peter Stephenson

IronKey F200 Biometric Flash Drive

starstarstarstarstar
he IronKey F200 Biometric Flash Drive by Imation comes in several sizes for different uses. The first noticeable aspect out of the box is the water¬proofing case that houses the flash drive.

SecureAuth IdP

starstarstarstarstar
ecureAuth IdP is a good choice for an authentication solution because it supports a variety of multi-platform authentication devices and the server can be setup in the cloud or on-premises.

SecurEnvoy SecurAccess v7

starstarstarstarstar
SecurEnvoy’s SecurAccess is a product for authentication using multifactor and/or biometrics. This class of products provide enhanced security for users providing credentials for access to an authenticator or authentication server.

Check Point Next Generation Threat Prevention Appliance

starstarstarstarstar
The Threat Prevention Appliance from Check Point Technologies provides a solid security platform that can be customised with the addition of several software blades.

Cyberoam Technologies Pvt Ltd CR200iNGXP

starstarstarstarstar
The CR200iNG-XP from Cyberoam Technologies offers full-scale, best-of-breed protection including an intrusion prevention system, gateway anti-virus, spam prevention at the gateway, web content filtering and a web application firewall.

Dell SonicWALL NSA 4600

starstarstarstarstar
The NSA 4600 from Dell SonicWALL incorporates next-generation firewall technology combined with a multi-core hardware platform to provide robust protection at the perimeter of even some of the most demanding networks.

Fortinet FortiGate140DPOE

starstarstarstarstar
The FortiGate-140D-POE from Fortinet offers a built-in firewall, intrusion prevention system, application control, web and email filtering and anti-virus in one solid appliance.

SecPoint Protector P800

starstarstarstarstar
The Protector UTM appliance from SecPoint offers a full set of features packed into a single device.

VASCO aXsGUARD Gatekeeper

starstarstarstar¾
This product provides a complete secure remote access platform that incorporates many perimeter security functions.

WatchGuard XTM 545

starstarstarstarstar
The XTM 545 from WatchGuard provides an excellent mix of best-of-breed functions and an easy-to-manage platform for robust perimeter security.

Bitdefender GravityZone

Take a security server in your virtual environment, add tools on each of the virtual servers you want to protect, throw in a control centre in the cloud and you have what you need to protect against malware in the virtual world.

Sign up to our newsletters