Rapid7 has been in the vulnerability game for a long time and now have gotten into the active detection game.
This is a high interaction honeypot on steroids.
This product – with its objective of defeating persistent malware – is a fit for active breach detection.
There really is little, if anything, that XPS cannot do in the digital forensics detection, analysis, prevention and response arena.
The GuardiCore suite exhibits characteristics of both active breach detection and threat deception plus a whole lot more.
illusive is a very cool products that has as its main purpose focusing on the actors rather than the malware in an attack.
LightCyber provides us with a behavioural attack detection tool.
The whole focus of TrapX is based on operationalising deception as a defensive activity.
This is an active breach detection tool with a very particular focus: malware, most especially APTs.
STREAM is an integrated risk management tool delivered as a software product consisting of a database server, an application server and a client component.
This is a hybrid application. It has many of the aspects of a traditional GRC platform and many of the technology-centric attributes. But, for all of that, it is biased toward risk management, albeit with many other GRC trappings.
This is a very specialised product. Its premise – and a good one it is – is that the firewall(s) manage the risk in any system.
This is an interesting product. It focuses on taking GRC into an IT environment and aligning it with business priorities to manage security and compliance.
FireMon Security Intelligence Platform is focused on monitoring and managing firewalls.
This is a modular application delivered as SaaS or on-premise.
This is a traditional approach to GRC with the added benefit of being able to consume vulnerability data from third-party scanners.
The RSA Archer GRC is a platform that integrates with a number of modules such as policy management, vulnerability risk management and content library.
Rsam is undeniably a traditional GRC product but with a few nice twists.
Skybox Enterprise Suite is strongly focused on the risk part of GRC.
The Network Configuration Manager takes everything that SolarWinds does well and wraps it in a cloak of GRC functionality.
Tripwire Enterprise is a security configuration and change management tool.
TrustedAgent GRC is risk-focused and takes a decidedly traditional GRC approach.
Tufin Orchestration Suite is a tool that decidedly is on the technical side of GRC management.
We have been using AccessData tools for years and they never disappoint.
This is a simple tool but it may be one of the most important in your kit.
EnCase has a long history in law enforcement and, in recent years, has moved strongly into the corporate world.
Distil inspects each http request in real time to determine if it is a malicious bot.
This should be in every digital forensic lab, especially those that need to track evidence for use in court.
XRY Office is a mobile device analysis tool, unusual in that it is very strong in recovering forensic data from devices that are locked without having to know the unlock code.
PacketSled is a cloud-based breach detection and network forensics tool that provides real-time detection of threats as they cross the wire, and retroactive investigation of host activity including the application of new indicators to historical data.
We are looking at three powerful tools in the UFED series: UFED 4PC Ultimate, UFED Link Analysis and the new UFED Cloud Analyser.
This product is the poster child for next-generation anti-malware.
The Swiss Army knife of endpoint security.
ESET Endpoint Security is one of the products that does a lot of different functions.
EnCase Endpoint Security really has two parts: Threat Detection and Incident Response.
Advanced Endpoint Protection (AEP) is a very competent anti-malware tool that really focuses on the task at hand: protecting the endpoint from malware threats.
Pulse Secure PulseWorkspace is just for mobile device endpoints. It functions on iOS or Android and, as we are seeing more frequently, it depends on containerisation.
SureView Insider Threat is largely an investigative platform.
SentinelOne EPP (Endpoint Protection Platform) is an anti-malware approach to endpoint security on Windows, OS X and Android devices.
VIPRE Business Premium is one of the endpoint products that focuses on malware and it does it well.
Being Trend Micro - a well-known anti-malware vendor - one would expect the Smart Protection Complete suite to be an enhanced anti-malware product.
This cloud access security broker supports a huge number of cloud applications and is simple to deploy and seamless to users.
This suite of tools from Alert Logic protects data in multiple locations, including on-premises.
The heart of Bitglass Enterprise Edition (BEE) is digital rights management (DRM).
CloudSOC is a new security stack defined for the cloud, residing in the cloud and provisioned from the cloud.
FireLayers Secure Cloud Gateway (SCG) is another approach to securing applications in the cloud.
Stops the spread of attacks with security that enforces precise inbound and outbound communications on every workload based on natural language policies for application interactions.
Integrated security management tool deployed in the cloud.
Provides situational awareness of network architecture, segmentation and cyber-security, supporting decision-making impacting security and compliance relating to cloud or virtual environments.
Combines security configuration management, threat detection, predictive analytics and automated incident response for cloud assets from branded applications, such as Microsoft Office 365, to infrastructure, such as AWS.
Addresses compliance, security and privacy issues for cloud-based applications.
We like a product that actually is a solution. Solution is one of those hype-laden marketing buzzwords that says, “We’re not sure why you need this but it’s a solution.”
The problem this tool is addressing is twofold: lack of visibility in the cloud and inefficient security controls.
The silver bullet of data security is encryption. Simple, right? Not so fast…there are several issues, especially in a virtual environment, that make that simple statement a little more difficult in practice.
Kaspersky has built itself up from a purveyor of anti-virus software to a full-blown security management company and has now moved into the virtual environment with this offering. Right from the first, we were impressed.
We’ve seen user isolation in the cloud before and some of it is very effective. Typically, users are directed to a cloud service that spots malware and then refuses to deliver content that is infected.
Cloud-based file-sharing and collaboration services are the bane of most organisations because they are not, of themselves, secure.
The Boldon James Classifier bundle is a comprehensive data leakage prevention solution that is easy to implement in organisations large and small.
Code Green Network's TrueDLP product is an extremely effective solution to data leak protection.
Identity Finder Sensitive Data Manager takes a robust approach to data leakage prevention, offering maximum security across almost any networked device.
TITUS Classification Suite approaches data classification in a unique way: By giving power back to the user while double-checking with automated analysis.
Varonis DatAdvantage and the Data Classification Framework work to identify where any and all of your sensitive and proprietary information lies.
SafeNet Authentication Service is a cloud-based authentication service that uses a wide range of tokens and custom agents to support multifactor authentication to include one-time passwords generated by a phone app, SMS, a hardware token or email.
DualShield is an enterprise-grade, unified, multifactor authentication platform that protects all commonly used business applications with a large selection of multifactor authentication methods.
DIGIPASS 760 is a trusted hardware device for visual transaction-signing that creates a secure optical communication channel between the end-user (client) and the organisation (server).
Entrust IdentityGuard is a dual-factor authentication server, app, smart card manager, biometrics server and general jack-of-all-trades when it comes to dual-factor authentication.
The Imation IronKey F200 Flash Drive is a simple, easy to set up and extremely secure device for users who need to transport confidential data between computers.
LoginTC from Cyphercor is a cloud-based solution that uses a mobile device or a desktop for authentication. It has easy-to-use iOS, Android and Chrome desktop applications to approve logins to a variety of products.
PortalGuard is a multifactor authentication, web-based single sign-on (SSO) through internet information services (IIS) and self-service password reset server and application rolled into one.
The RSA Authentication Manager is a dual-factor authentication system designed from the ground up for enterprise deployment.
SecureAuth IdP is an identity provider – with a unique approach to securing user access control.
The Swivel Appliance is a competitive solution for two-factor authentication methods for clients searching for a secure product.
The BeyondTrust UVM20 Security Management Appliance is the preconfigured hardware offering of Retina CS Enterprise Vulnerability Management.
Core Security’s Core Insight is the gold standard for penetration testing and vulnerability assessment.
Qualys Express Lite is a cloud-based vulnerability assessment tool intended for small businesses.
Rapid7 Nexpose Ultimate is a comprehensive vulnerability scanner that is determined to convince you of its findings.
The SAINT Security Suite is a robust software package that quickly and easily gives a heads-up view of vulnerabilities on the network.
Secunia Corporate Software Inspector (CSI) inspects software on any Windows or Android device with an agent.
The Skybox Enterprise Suite is an enterprise vulnerability assessment tool that is deployed to aid in vulnerability and threat management, as well as security policy management.
Tenable Network Security Nessus is one of the most comprehensive and widely deployed vulnerability assessment tools.
The Tripwire IP360 appliance is a solution to advanced enterprise threat detection, vulnerability management and risk assessment.
This product collects threat intelligence data from a variety of sources.
Engineers at OpenDNS have developed a suite of tools that they use to manage, monitor and investigate potential cyber-threats, especially those that impact name servers directly. One of those tools is Investigate.
This is a solid, technically oriented open source intelligence service.
This is a general open source intelligence tool with a solid, though not extensive, focus on cyber-intelligence.
This is an extremely powerful system for gathering, analysing and acting on cyberthreat intelligence.
ThreatStream’s OPTIC is a cyberthreat intelligence platform that manages the lifecycle of threat intelligence via integration across an enterprise’s security infrastructure.
This is a very good threat intelligence tool where almost all of the threat sources and analytics are under the covers.
Adds a lot of value to your security stack by applying threat intelligence. Provides a prodigious amount of extremely useful research, much of it from analysts around the globe.
Threat intelligence appliance that ties the Norse DarkMatter infrastructure to your network.
The Barracuda Web Application Firewall is a hardware-based device which is used to monitor, assess and remediate web-based application vulnerabilities.
The FortiDB 1000D is a hardware appliance that monitors, audits and identifies vulnerabilities in databases. There are three deployment options: network sniffer, native audit and network agents.
Sensitive Data Manager ties discovery to business issues making classification easier and more relevant.
This is a clean product with a well thought-out goal and a well-executed solution. It is part of the overall CA suite of access control products with which it integrates smoothly, and it offers dynamic classification and recognition.
Allows users to apply relevant visual and metadata labels.
Provides classification for data, largely in a Microsoft environment, plus mobile environments.
Threat protection centered outside the firewall.
Detects anomalous behaviour on websites.
Account takeover detection and prevention.