Bufferzone uses a unique approach to protecting the endpoint.
This is a pure-play endpoint protection tool with a strong focus on malware.
This is one of the best-known endpoint DLP products in the industry.
X by Invincea is an endpoint protection tool that is focused strongly on malware protection.
This is a full-featured endpoint and DLP product.
A very competent endpoint DLP tool with some endpoint protection functionality.
Like a true next-generation product, this one leverages machine learning, an extensive cloud system with a huge number of telemetry points around the world.
This is a very simple to deploy endpoint security system with optional mobile device management.
This is a cloud-based SaaS product with agents at the endpoints.
Of the products we reviewed, Citrix XenMobile was the easiest to deploy, use and provision.
Security is excellent and the policy capabilities are what you should expect in a product of this type.
Out of the gate we need to say that this product impressed us.
This product is well thought-out and has a lot of good functionality.
This is a full-featured vulnerability management platform with all of the bells and whistles you need to deal with vulnerabilities on your enterprise.
Insight automates much of the vulnerability management workflow beginning with asset discovery.
Traffic IQ Professional may be just what the doctor ordered.
MAX Risk Intelligence requires almost no interaction with the user and it can be set to remind the user to scan automatically.
SAINT is one of the pioneers in mixing vulnerability assessment and penetration testing in the same tool.
Many of Security Suite's modules interact in such a manner that the overall management of vulnerabilities – particularly analytics – is enhanced significantly.
This has next-generation capabilities.
The IP360 is a feature-rich vulnerability management system with a pure-play vulnerability assessment personality.
AlienVault, the company with the cool logo, has really outdone themselves with the Unified Security Management Platform (USM).
This one leads two lives: a SIEM in its own right or a tool that can work alongside other, perhaps larger, SIEMs.
Excellent value and wide-ranging capabilities perhaps unexpected in such a modestly priced package.
Probably the most complete pure-play SIEM we’ve seen with the added benefit of many next-gen features and superlative correlation and analytics.
Probably the most comprehensive and powerful SIEM we’ve seen, continuing the legacy of the old Nitro product up to the present time.
The T30-W is a UTM for small- to medium-sized organisations. Used with Dimension it provides most of the functionality needed for today’s threatscape.
Bayometric does have many kinds of fingerprint scanners available for sale, it primarily is the developer of a fingerprint recognition API.
The idea behind Datablink is that you pair up your device or mobile phone with a screen that is presented from a server online.
PortalGuard is a dedicated web-based portal that provides all strong authentication for the assets it supports.
SafeNet Authentication Service is a SaaS offering, but it can be set up on-premises if desired.
SecureAuth IdP is a specialised web server that can act as a portal with strong authentication tied to the applications or web/cloud locations to which it allows connections.
This suite addresses malicious actors and can intercept and decode online banking transactions.
The YubiKey is an odd, little touch-sensitive second-authentication factor.
PowerBroker and Password Safe from BeyondTrust are the privileged account management components that sit on top of the much larger BeyondInsight platform.
Bomgar Privileged Account Management and Vault is an agentless, proxy-based appliance that helps secure privileged account access and monitor systems accessed with those accounts.
Privileged Access Manager from CA Technologies is an appliance-based access gateway for securing access to systems using privileged accounts.
The two components of this tool make for a solid privileged account management platform to secure access to crucial accounts both on the enterprise network but also in the cloud
The CyberArk Privileged Account Security Solution is an entire account management platform that combines a password vault with strong controls and real-time threat detection.
The Hitachi ID Privileged Access Manager is a more traditional privileged account manager product with some really great features and functionality.
The Lieberman Enterprise Random Password Manager provides a secure repository for storing and managing access to privileged accounts and their associated passwords.
Password Manager Pro from ManageEngine provides simple and easy-to-deploy password and access management to privileged or system accounts.
The NetIQ Privileged Account Manager offers a four-tiered approach to managing privileged access.
The Netwrix Auditor takes an interesting yet vital approach to managing privileged accounts: Information is key.
The Pleasant Password Server from Pleasant Solutions provides a secure password vault and privileged account password management that leverages KeePass technology to expand web-based sign-on functionality to the enterprise.
Secret Server from Thycotic offers highly scalable distributed privileged account management.
The AdminBastion Suite from Wallix takes a very interesting approach to privilege account management and access.
Rapid7 has been in the vulnerability game for a long time and now have gotten into the active detection game.
This is a high interaction honeypot on steroids.
This product – with its objective of defeating persistent malware – is a fit for active breach detection.
There really is little, if anything, that XPS cannot do in the digital forensics detection, analysis, prevention and response arena.
The GuardiCore suite exhibits characteristics of both active breach detection and threat deception plus a whole lot more.
illusive is a very cool products that has as its main purpose focusing on the actors rather than the malware in an attack.
LightCyber provides us with a behavioural attack detection tool.
The whole focus of TrapX is based on operationalising deception as a defensive activity.
This is an active breach detection tool with a very particular focus: malware, most especially APTs.
STREAM is an integrated risk management tool delivered as a software product consisting of a database server, an application server and a client component.
This is a hybrid application. It has many of the aspects of a traditional GRC platform and many of the technology-centric attributes. But, for all of that, it is biased toward risk management, albeit with many other GRC trappings.
This is a very specialised product. Its premise – and a good one it is – is that the firewall(s) manage the risk in any system.
This is an interesting product. It focuses on taking GRC into an IT environment and aligning it with business priorities to manage security and compliance.
FireMon Security Intelligence Platform is focused on monitoring and managing firewalls.
This is a modular application delivered as SaaS or on-premise.
This is a traditional approach to GRC with the added benefit of being able to consume vulnerability data from third-party scanners.
The RSA Archer GRC is a platform that integrates with a number of modules such as policy management, vulnerability risk management and content library.
Rsam is undeniably a traditional GRC product but with a few nice twists.
Skybox Enterprise Suite is strongly focused on the risk part of GRC.
The Network Configuration Manager takes everything that SolarWinds does well and wraps it in a cloak of GRC functionality.
Tripwire Enterprise is a security configuration and change management tool.
TrustedAgent GRC is risk-focused and takes a decidedly traditional GRC approach.
Tufin Orchestration Suite is a tool that decidedly is on the technical side of GRC management.
We have been using AccessData tools for years and they never disappoint.
This is a simple tool but it may be one of the most important in your kit.
EnCase has a long history in law enforcement and, in recent years, has moved strongly into the corporate world.
Distil inspects each http request in real time to determine if it is a malicious bot.
This should be in every digital forensic lab, especially those that need to track evidence for use in court.
XRY Office is a mobile device analysis tool, unusual in that it is very strong in recovering forensic data from devices that are locked without having to know the unlock code.
PacketSled is a cloud-based breach detection and network forensics tool that provides real-time detection of threats as they cross the wire, and retroactive investigation of host activity including the application of new indicators to historical data.
We are looking at three powerful tools in the UFED series: UFED 4PC Ultimate, UFED Link Analysis and the new UFED Cloud Analyser.
This product is the poster child for next-generation anti-malware.
The Swiss Army knife of endpoint security.
ESET Endpoint Security is one of the products that does a lot of different functions.
EnCase Endpoint Security really has two parts: Threat Detection and Incident Response.
Advanced Endpoint Protection (AEP) is a very competent anti-malware tool that really focuses on the task at hand: protecting the endpoint from malware threats.
Pulse Secure PulseWorkspace is just for mobile device endpoints. It functions on iOS or Android and, as we are seeing more frequently, it depends on containerisation.
SureView Insider Threat is largely an investigative platform.
SentinelOne EPP (Endpoint Protection Platform) is an anti-malware approach to endpoint security on Windows, OS X and Android devices.
VIPRE Business Premium is one of the endpoint products that focuses on malware and it does it well.
Being Trend Micro - a well-known anti-malware vendor - one would expect the Smart Protection Complete suite to be an enhanced anti-malware product.
This cloud access security broker supports a huge number of cloud applications and is simple to deploy and seamless to users.
This suite of tools from Alert Logic protects data in multiple locations, including on-premises.
The heart of Bitglass Enterprise Edition (BEE) is digital rights management (DRM).
CloudSOC is a new security stack defined for the cloud, residing in the cloud and provisioned from the cloud.
FireLayers Secure Cloud Gateway (SCG) is another approach to securing applications in the cloud.
Stops the spread of attacks with security that enforces precise inbound and outbound communications on every workload based on natural language policies for application interactions.
Integrated security management tool deployed in the cloud.
Provides situational awareness of network architecture, segmentation and cyber-security, supporting decision-making impacting security and compliance relating to cloud or virtual environments.
Combines security configuration management, threat detection, predictive analytics and automated incident response for cloud assets from branded applications, such as Microsoft Office 365, to infrastructure, such as AWS.
Addresses compliance, security and privacy issues for cloud-based applications.