Business & finance
The SC Blog
13th June at 2:00pm BST || Learn about how business environments can use MFA on the road to de-perimeterisation and zero-trust models to improve internal security...
Sponsored by: Duo Security
Centre for all IT-related crime content including data theft, ransomware, phishing and malware.
Centre for all content concerning IT infrastructures including cloud security and more.
Verdict: Not much to say here besides that this product is SC Lab Approved and that is our highest award. This is one of the best UTMs we’ve tested and over long periods of use it has delivered very well. We make it SC Lab Approved for another year.
Verdict: Especially for organisations with limited expertise in applying all of the things a SIEM can do to protect their enterprises, this product is a must-see. However, any size organisation can benefit by considering this as part of its security stack.
Verdict: There is a lot to getting this one up and running, but once it’s up and you have the things you want to monitor plugged in, this one of the most complete SIEMs we’ve seen.
Verdict: We like this a lot, especially for SMBs, although larger organisations certainly should not rule it out as too small. It’s not. For its value and feature set, as well as the efforts to improve and keep the product ahead of the curve, we make this our Best Buy.
Verdict: Since this already is SC Lab Approved, we can’t give it a higher rating. We like this well enough that we are extending its SC Lab Approved designation for another year. It continues to be our key analysis tool.
Verdict: This is an important contender for your SOC SIEM. It will take data from just about anything you need to monitor and it includes solid third-party threat feed access. This is our Recommended product.
Verdict: This demands your attention no matter what size your organisation. There are models to cover most requirements.
Verdict: This is a product with which you pretty much can’t go wrong, especially since it integrates with most products that need the log management and analysis that it does. It is sort of a SIEM’s SIEM.
Enterprise Phishing Susceptibility Report
Phishing attacks are the largest challenge to organizations because they target all employees. This report examines factors that lead to successful phishing campaigns and how empowering...
SC Media eBook on Threat Intelligence
This eBook looks at threat intelligence techniques used to detect cyberespionage and provides recommendations on what companies can do immediately to reduce exposure. Threat intelligence...
Forrester Report: The Total Economic Impact of PhishMe's Human Phishing ...
Download this Forrester report to learn how organizations saw an 80% average reduction in phishing click rates by employees and a 30% productivity increase across security operations...
Osterman Research: Techniques for Dealing with Ransomware, BEC, and Spearphishing
Download this whitepaper to learn why phishing threats remain a high concern for major IT decision makers, as well as key steps organizations can take to improve defenses against phishing...