If you don't establish a solid base to build your cyber-security from, your efforts may not yield the positive results you anticipated.
Sponsored by: Tripwire
It is no exaggeration that enterprises can run on average 25 security products concurrently, as it is the case with financial services organisations, according...
Sponsored by: Secdo
Verdict: For a mix of threat analysis and incident response – where the core of the alert is malware-based – this one demands your attention. The Carbon Black experience is obvious.
Verdict: This is a strong product under the covers but with a few warts for users. None of those are show-stoppers, though, and you would do well to take a close look at it.
Verdict: This is a very sophisticated but rather specialised tool for the endpoint. If you are a large organisation or one with high-value information assets, this is well worth your time. For what it does, we know of no better tool available. We make this our cloud-based Recommended product.
Verdict: If you are using CylancePROTECT this is a no-brainer. If you are not, it’s a good reason to consider it. Because CylancePROTECT is one of our SC Lab Approved products, it already has our highest rating, but we are naming the OPTICS add-on Recommended for the value that it adds ...
Verdict: If you’re looking for a threat-focused endpoint tool at an attractive price point this is worth your attention. For its ease of use and deployment, we make this our on-premises Recommended tool.
Verdict: This is one of the strong players in this field. Although it shows, clearly, a legacy of anti-malware (to the point where it still refers to “anti-virus,” even though it really addresses all malicious software), this tool is a capable contender for endpoint security in general.
Verdict: An exceptional effort on behalf of the McAfee technical support team that provided the SC Lab with the opportunity to dedicate more time to testing the product package. Overall, an excellent product, but you’ll get the most out of it as part of the entire McAfee suite managed, as ours ...
Verdict: Don’t pass this one by if you are looking at anti-malware. In our view, it certainly ranks in the top five such products we’ve seen over the past couple of years.
SC Media eBook on Threat Intelligence
This eBook looks at how you can focus your threat intelligence feeds and tune your network hardware to provide the data you need.
SC Media eBook on Internet of Things
IoT devices need not even be connected directly to the internet to become corporate vulnerabilities.
SC Media eBook on DDoS
Today’s attackers can corral millions of systems infected with malware to launch focused botnet attacks that can easily bring down targeted servers.
SC Media eBook on Insider Threat
Not all threats are malicious. Well-intentioned employees represent a risk vector just as severe as others.