LATEST SECURITY NEWS AND ANALYSIS

48 Percent of U.S. Companies Using IoT Have Suffered Security Breaches

The cost of those breaches ranged from hundreds of thousands to tens of millions of dollars, a recent survey found.

Read More

Honda Plant Shut Down by Ransomware Attack

Competitors Nissan and Renault were also forced to stop production last month, Reuters reports.

Read More

How Tenable Network Security is More Than Just Vulnerability Scanning

VIDEO: Amit Yoran, CEO of Tenable discusses his vision for where the security vendor is headed.

Read More

TOP IT SECURITY RESOURCES

HOW TO STOP RANSOMWARE

Ransomware is a growing threat that can cost enterprises millions. Find out how to prevent it or get rid of it.

Read More

THREAT INTELLIGENCE AND ANALYTICS

We offer a thorough overview of cyber threat intelligence and how to implement it in your business.

Read More

Top 10 Endpoint Detection and Response (EDR) Solutions

Top 10 Endpoint Detection and Response (EDR) Solutions

|

Endpoint Detection and Response (EDR) solutions offer continuous monitoring and response to advanced security threats. Here are the top EDR vendors to consider.

READ MORE
CounterTack Endpoint Threat: EDR Product Overview and Insight

CounterTack Endpoint Threat: EDR Product Overview and Insight

|

We review CounterTack's Endpoint Threat Platform, an EDR solution that can perform billions of scans per second and uses behavioral analysis, machine learning and reputational techniques to counter threats.

READ MORE
CrowdStrike Falcon Insight: EDR Product Overview and Insight

CrowdStrike Falcon Insight: EDR Product Overview and Insight

|

We review CrowdStrike Falcon Insight, a cloud-based EDR platform that analyzes more than 30 billion endpoint events per day from millions of sensors deployed across 176 countries.

READ MORE
Tanium: EDR Product Overview and Insight

Tanium: EDR Product Overview and Insight

|

We review Tanium's EDR solution, which can scale to millions of endpoints with requiring additional infrastructure.

READ MORE

IOT SECURITY

Learn what smart enterprises can do to secure their IoT deployments.

READ MORE

ENTERPRISE MOBILITY MANAGEMENT (EMM)

Mobile end-user devices need to be managed to improve employee productivity and to reduce risks.

READ MORE

CLOUD ACCESS SECURITY BROKERS (CASB)

More companies are moving sensitive data to the cloud, increasing the need to secure that data.

READ MORE

SECURITY INCIDENT AND EVENT MANAGEMENT (SIEM)

SIEM products are no longer just for large enterprises. We'll help determine if SIEM is for you.

READ MORE

SECURITY DAILY NEWSLETTER

GET SECURITY NEWS IN YOUR INBOX EVERY DAY
|

ESG Research Insights Paper: Network Security Trends

In the second half of 2016, Gigamon commissioned the Enterprise Strategy Group (ESG) to conduct a survey of 300 IT and cybersecurity professionals. Respondents to the survey all had responsibility and involvement in the planning, implementation, and/or operations of their organization's …

IDC MaturityScape: Multicloud Management 1.0

This IDC study assists senior IT leaders in assessing the current state of their hybrid cloud management processes, governance models, technologies, and skills to identify gaps and create a road map for better aligning the organization's management model and tools with the emerging needs …

451 Research - A Deeper Dive into Hybrid Cloud Storage

This report from 451 Research examines the challenges faced by IT teams managing data in a hybrid cloud environment. It identifies key considerations in the areas of security, cost management and performance and provides recommendations for both cloud managers and administrators.

Mobile Application Management Platform Evaluation Checklist

Mobile application management (MAM) refers to the workflow for security, governance, and distribution of mobile apps in the enterprise. Best-of-breed MAM provides app-level security for any app, deploys apps to every user in the extended enterprise because it is device management agnostic, …
 
SEE ALL WHITEPAPERS
 
Cisco AMP for Endpoints: EDR Product Overview and Insight

Cisco AMP for Endpoints: EDR Product Overview and Insight

|

We review Cisco AMP for Endpoints, an EDR solution with a 100% score from NSS Labs for malware and exploit detection and the ability to block 20 billion threats a day.

READ MORE
RSA NetWitness Endpoint: EDR Product Overview and Insight

RSA NetWitness Endpoint: EDR Product Overview and Insight

|

We review RSA NetWitness Endpoint, an EDR solution that uses behavior analytics, machine learning and threat intelligence to detect and prioritize threats.

READ MORE
Symantec Endpoint Protection: EDR Product Overview and Insight

Symantec Endpoint Protection: EDR Product Overview and Insight

|

We review Symantec Endpoint Protection with EDR, which can scale to hundreds of thousands of nodes and is supported by the world's largest threat intelligence network.

READ MORE
Cybereason Total Enterprise Protection: EDR Product Overview and Insight

Cybereason Total Enterprise Protection: EDR Product Overview and Insight

|

We review Cybereason Total Enterprise Protection, an EDR solution for companies of any size with little IT security expertise. It has unlimited scalability and can process 8 million questions a second.

READ MORE