The Threat Prevention Appliance from Check Point Technologies provides a solid security platform that can be customised with the addition of several software blades.
The CR200iNG-XP from Cyberoam Technologies offers full-scale, best-of-breed protection including an intrusion prevention system, gateway anti-virus, spam prevention at the gateway, web content filtering and a web application firewall.
The NSA 4600 from Dell SonicWALL incorporates next-generation firewall technology combined with a multi-core hardware platform to provide robust protection at the perimeter of even some of the most demanding networks.
The FortiGate-140D-POE from Fortinet offers a built-in firewall, intrusion prevention system, application control, web and email filtering and anti-virus in one solid appliance.
The Protector UTM appliance from SecPoint offers a full set of features packed into a single device.
This product provides a complete secure remote access platform that incorporates many perimeter security functions.
The XTM 545 from WatchGuard provides an excellent mix of best-of-breed functions and an easy-to-manage platform for robust perimeter security.
Take a security server in your virtual environment, add tools on each of the virtual servers you want to protect, throw in a control centre in the cloud and you have what you need to protect against malware in the virtual world.
Compliance monitoriing is claimed by all but delivered by few, so its good to find a product that truly delivers.
This is the only virtual security product of its type exclusive to Microsoft Hyper-V.
This is a security automation product for use in a VMware environment.
Virtual management for virtual environments.
Secures servers with software-based attestation, full-memory encryption and OS hardening, providing a foundation for trusted computing.
The BIG-IP 4200v with ASM from F5 is well-stocked with original, useful features.
Fortinet is well-known for its products, and those we have reviewed in the past exhibited high quality response to a variety of challenges.
Right out of the box, Imperva’s SecureSphere X1010 Web Application Firewall X1010 presented a slight learning curve to get it configured, as all the documentation was not available right away.
SecureSphere Database Activity Monitoring hardware appliance by Imperva is a well put together and configured machine that provides outstanding protection to both web and database servers.
The McAfee Database Security Solution software is a solid buy for any enterprise.
The FortiMail-200D from Fortinet features many email security features bundled into an easy-to-manage appliance. It includes anti-virus, anti-spam, onboard identity-based encryption, and content filtering and data leakage prevention through the use of many predefined policies.
McAfee Email Protection offers full-scale email security and content management in a single appliance with flexible deployment options.
CA DataMinder Classification “discovers and classifies sensitive structured and unstructured content stored within file servers, databases, collaboration tools and storage repositories.
Provides email and document classification – when both products are used – for Microsoft platforms.
As part of the Digital Guardian program, provides data classification.
Provides data classification for human-generated files, such as documents and SharePoint files or any human-generated files that reside on file servers.
SaaS-delivered secure collaboration application.
Model 660 is a useful tool that provides protection for web applications.
The tool takes advantage of IP reputation, context and categorization to analyze incoming and outgoing IP addresses.
A comprehensive database security management tool that provides vulnerability assessment, auditing and monitoring for database management systems.
The appealing aspect of the M100 - and other Imperva servers - was the preloaded policies that were already running once the server was up and operating.
This solution provides protection against such attacks as SQL injection. It is intended to be used with SecureSphere Web Application Firewall.
McAfee describes the functionality of the tool as providing "the five essentials for database protection: discovery, assessment, monitoring, prevention and compliance."
AIMS provides a complete set of identity management (IdM), network access control (NAC) and data leakage prevention (DLP) features.
Network Sentry monitors edge connections to a network and provisions the appropriate level of network access based on role-based security policies.
By leveraging an existing infrastructure enterprise, Centrify Suite 2013.2 Platinum Edition provides central control and securing and auditing of user access through cross-platform systems, mobile devices and applications.
TrueDLP is delivered via Code Green Networks’ Content Inspection (CI) Appliances.
The Fischer International Identity solution is a set of high-availability Java applications for SaaS (software-as-a-service) and on-premise, running on open source or commercial off-the-shelf (COTS) platforms (OS, DB, directory, etc.).
ForeScout CounterACT offers an enterprise-class NAC platform that assures network access based on real-time endpoint classification configuration assessment, user and endpoint compliance policy and automated response.
The Hitachi ID Management Suite v8.2.1 contains several identity management components that are well integrated to form a fairly comprehensive suite.
The Enterprise Random Password Manager (ERPM) from Lieberman Software is more than just a random password generator.
Identity Manager from NetIQ provides tools for managing the entire user identity lifecycle – from on-boarding through deletion and everything in-between.
The Pleasant Password Server from Pleasant Solutions provides a way to add central management capabilities to the KeePass Password Safe, a free, open source password manager.
Safe Access from StillSecure is a feature-rich network access control appliance that can detect and monitor many types of endpoints throughout the network and ensure they comply with the enterprise policy before access to network resources is granted
The MailGate SC from Axway incorporates email security with safeguard collaboration functions.
The Spam & Virus Firewall from Barracuda Networks provides solid inbound and outbound email security functionality through a feature-rich appliance.
The Cisco Email Security virtual appliance offers a full set of inbound and outbound email security and control features.
The ePrism Email Security appliance from EdgeWave offers email security features such as inbound and outbound content filtering and email policy enforcement, anti-spam and anti-virus.
The F-Secure Protection Service for Email is a fully hosted email security offering that can work in tandem with an already existing email server to provide a complete set of email security features.
The XCS (Extensible Content Security) Appliance from WatchGuard provides solid email security and email content management in one easy-to-manage appliance.
This tool manages card-not-present (CNP) transactions.
This solution offers comprehensive protection for websites.
This product provides account takeover protection.
This solution, part of our Emerging Products Group Test on online fraud, provides two-factor authentication in a consumer environment.
DeviceLock Endpoint DLP Suite consists of three powerful components, the first being the DeviceLock module.
DriveLock from CenterTools provides a full set of endpoint security features. With this, from one single platform administrators can deploy policy that includes control over removable media, applications and devices, encryption and anti-virus.
Endpoint Protector 4 from CoSoSys provides endpoint protection through the use of three feature-rich modules: Device Control for endpoints, Content Aware Protection for endpoints and Mobile Device Management.
Trend Micro’s Enterprise Security for Endpoints, with Enterprise Data Protection add-on v10.6, secures the endpoints both on and off the network with anti-malware, malicious websites blocking and host intrusion protection.
Eset Endpoint Security provides a full range of endpoint protection features and offers administrators the ability to easily secure and protect Microsoft Windows endpoints throughout the network from viruses and spyware, as well as deploy firewall capability, spam protection, web filtering and device control.
FortiClient from Fortinet is an endpoint security client designed to be deployed alongside FortiGate. While these clients can run independent of an appliance, the true management capability is done through it.
Invincea Enterprise takes a unique approach to stopping and controlling malware infection at the endpoint. With this software deployed, virtually all malware can seamlessly be detected, contained and prevented without any need for user interaction.
Kaspersky Endpoint Security for Business provides a full suite of endpoint security features in one easy-to-manage application.
LANDesk Security Suite v9.5 manages, assesses and controls security at the endpoint through a single agent and server architecture.
Lumension Endpoint Management and Security Suite (LEMSS) v7.3 unifies the functions of IT operations and security through a single console, server and agent architecture to seamlessly and more effectively address IT risk and systems management requirements across the enterprise.
Novell Endpoint Protection Suite is a compilation of three software products: Novell Zenworks Endpoint Security Management, Novell Zenworks Full Disk Encryption and an optional subscription to Novell Zenworks Patch Management.
Protect On Q (POQ) v3.2 from Quarri takes a fairly unique approach to endpoint protection. It is a security software solution that helps to prevent data leakage.
Safetica manages and controls data security at the endpoint through its client-server architecture and three major components: Endpoint Client, Management Server and the Safetica Management Console.
Sensitive Data Manager by Identity Finder comprises the Data Discover Endpoint and Enterprise DLP Console.
Sophos Complete Security Suite provides a good set of endpoint protection tools, including: an enterprise console; device control (including Windows, Linux, Unix, Mac and mobile units); web filtering; application control; data control; network access control; client firewall; encryption; anti-virus; and Sophos patch assessment.
Symantec Endpoint Protection is a client-server solution that protects laptops, desktops, Windows, Macs and servers. It protects against malware (such as viruses, worms, Trojans, spyware and adware), and provides protection against sophisticated attacks that evade traditional security measures (such as rootkits, zero-day attacks and spyware that mutates).
Total Defense for Business is a cloud-based endpoint security platform offering advanced anti-malware technology that protects an organisation's endpoint devices from malware, secures and controls applications being used by end-users, and protects against threats from removable media (e.g. USB drives).
Vipre combines a small-footprint anti-virus agent with integrated patch management and mobile device management (MDM), while Vipre Business Premium helps enterprises manage and control endpoint security without sacrificing system performance.
Wavelink Avalanche from allows administrators to remotely manage a number of endpoint devices, including those from Apple, Android and Windows Mobile, as well as wireless printers and Windows client machines.
Many security professionals appreciate the utility of collaborative workspace features they see in many of the free, online, cloud-based applications out there, but loathe the idea of entrusting the security of their corporate data to another company's cloud, no matter how sterling that company's reputation. That is why we love ...
Providing complete isolation of corporate data within an end-user-owned mobile device, Bitzer Enterprise Application Mobility (BEAM) allows IT departments to enforce data leakage protection policies while offering secure access to internal applications - without the use of VPN.
Mobile device management products shouldn't have to be complicated, and Fixmo SafeZone is proof of that. Incorporating 256-bit AES encryption, two-factor authentication support and a secure sandbox model into an easy-to-deploy application, it is a great choice for administrators who want robust, yet simple, data security on their users' mobile ...
Combining full mobile device management (MDM) with end-to-end encryption, Good for Enterprise from Good Technology offers an expansive suite of products, which allow administrators to embrace BYOD policies while remaining confident in their ability to maintain a data security posture.
Targeted at small to mid-sized businesses, Kaspersky Security for Mobile 10 integrates mobile device management into the company's security suite. While the initial setup may be slightly more complicated than some other products, the end result offers superb security and flexibility.
Mobile Enterprise Compliance and Security (MECS) Server from Mobile Active Defense (MAD) is making another appearance this year. For those who have not yet seen it, here is an introduction: The MECS Server provides full-on, tamper-proof firewall and compliance policy that is pushed down to mobile devices connected either via ...
Sophos Mobile Control provides a full set of features and functionality for management and control of a broad range of mobile devices. Administrators can use this tool to secure both employee-owned and corporate devices, including iDevices, Android devices, BlackBerry and Windows Phone 8.
TrustCall for iPhone from KoolSpan offers hardware-based encrypted calling between off-the-shelf iPhones. It achieves this by sending communication through the TrustRelay Server, which can be installed onsite or hosted by KoolSpan.
Zenworks Mobile Management from Novell allows for full control of a mobile device from both a security and policy perspective. It allows administrators to easily mange a device's security settings, such as requiring a PIN or password on the device, as well as encryption and file sharing requirements.
Many organisations outsource email to a cloud provider, and one of the most successful of these providers is Microsoft with its Office 365 offering.
One of the major issues in cloud-based security is that it is very hard to do. For lots of reasons, many from the business perspective, it is difficult to make the cloud as secure as the on-premise data centre.
Symplified addresses access management to cloud applications. It is visualised best as a single sign-on (SSO) product for the cloud.
Total Defense provides end-to-end security delivered from the cloud, including unified web, endpoint and email security, giving the same level of security as in the enterprise with a single console.
Zscaler is a comprehensive suite of security services delivered from the cloud. It covers email, web and mobile computing.
Agiliance RiskVision manages enterprise risk by making it visible, actionable and measurable across business units, IT operations and security management in near real-time.
AlgoSec Security Management Suite comprises three parts: FireWall Analyzer, FireFlow and BusinessFlow.
Allgress Business Risk Intelligence helps companies quickly and automatically aggregate data from security and compliance assessments and technical inputs and turn this into meaningful, actionable, risk-specific intelligence that can be aligned with the goals of the business.
Aruvio GRC is a complete set of governance, risk and compliance (GRC) applications, including controls, compliance, vendor risk, enterprise risk, incident management and policy and training.
Citicus One is an integrated system for organisations to automate their IT governance, risk and compliance management processes.
FireMon Security Manager with Risk Analyzer and Policy Planner modules offers comprehensive network security management, including firewall and router risk analysis, policy compliance auditing, change management and risk analysis.
LockPath Keylight is a family of applications that includes management of compliance, threats, risks, vendors, incidents and business continuity.
Lumension Risk Manager (LRM) is a compliance and risk management solution that provides a framework for streamlining compliance management and assessing business risk.
DeviceExpert from ManageEngine provides a comprehensive approach to network configuration and change and compliance management.
McAfee Total Protection (ToPS) for Compliance reduces remediation time from months to days by providing unique, countermeasure-aware, impact/risk assessment capabilities.
Modulo Risk Manager is a single, fully integrated platform for organisations to automate and unify their IT GRC processes.
NetIQ Secure Configuration Manager provides a feature-rich platform for monitoring and ensuring policy compliance throughout the network environment.
Change Tracker Enterprise from New Net Technologies (NNT) offers full change and policy compliance management and monitoring.
Promisec Endpoint Manager is a full-scale policy and endpoint management platform that allows administrators to inspect, monitor and enforce configuration and compliance policy across the entire IT environment from one easy-to-manage console.
RedSeal 6 is a risk-based IT security management platform that enables organisations to identify, prioritise and respond to critical points of weakness in complex enterprise security control infrastructure.