Business & finance
The SC Blog
13th June at 2:00pm BST || Learn about how business environments can use MFA on the road to de-perimeterisation and zero-trust models to improve internal security...
Sponsored by: Duo Security
Centre for all IT-related crime content including data theft, ransomware, phishing and malware.
Centre for all content concerning IT infrastructures including cloud security and more.
Verdict: Not much to say here besides that this product is SC Lab Approved and that is our highest award. This is one of the best UTMs we’ve tested and over long periods of use it has delivered very well. We make it SC Lab Approved for another year.
Verdict: Especially for organisations with limited expertise in applying all of the things a SIEM can do to protect their enterprises, this product is a must-see. However, any size organisation can benefit by considering this as part of its security stack.
Verdict: There is a lot to getting this one up and running, but once it’s up and you have the things you want to monitor plugged in, this one of the most complete SIEMs we’ve seen.
Verdict: We like this a lot, especially for SMBs, although larger organisations certainly should not rule it out as too small. It’s not. For its value and feature set, as well as the efforts to improve and keep the product ahead of the curve, we make this our Best Buy.
Verdict: Since this already is SC Lab Approved, we can’t give it a higher rating. We like this well enough that we are extending its SC Lab Approved designation for another year. It continues to be our key analysis tool.
Verdict: This is an important contender for your SOC SIEM. It will take data from just about anything you need to monitor and it includes solid third-party threat feed access. This is our Recommended product.
Verdict: This demands your attention no matter what size your organisation. There are models to cover most requirements.
Verdict: This is a product with which you pretty much can’t go wrong, especially since it integrates with most products that need the log management and analysis that it does. It is sort of a SIEM’s SIEM.
How UEBA Detects Compromised Credentials and Accelerates Investigation
This paper explains how an advanced UEBA solution efficiently processes mountains of data to identify anomalous characteristics of access and behaviour, minimize false positives, and...
Top 12 Use Cases for User Behaviour Analytics (UBA)
UBA is one of the fastest-growing areas within enterprise security. This whitepaper provides a checklist of the top 12 use cases UBA should support. Ideal for benchmarking your current...
Applying Data Science to User and Entity Behaviour Analytics
This whitepaper examines how sophisticated data science within today’s UEBA products addresses cyber threats, focusing on data analytics capabilities proven to work well for enterprises...
Beginner's Guide to SIEM
Need a crash course on SIEM? No problem. <br/> Download this whitepaper now to learn everything you need to know from what SIEM is (and isn't) to how to get it up and running quickly...