IT SECURITY PRODUCTS

We review the top IT security products to help you keep your data safe from cyber criminals, whether that data resides within your network, in the cloud or on mobile devices.

LATEST IT SECURITY PRODUCTS ARTICLES

Top 10 Endpoint Detection and Response (EDR) Solutions

|

Endpoint Detection and Response (EDR) solutions offer continuous monitoring and response to advanced security threats. Here are the top EDR vendors to consider.

READ MORE

CounterTack Endpoint Threat: EDR Product Overview and Insight

|

We review CounterTack's Endpoint Threat Platform, an EDR solution that can perform billions of scans per second and uses behavioral analysis, machine learning and reputational techniques to counter threats.

READ MORE

CrowdStrike Falcon Insight: EDR Product Overview and Insight

|

We review CrowdStrike Falcon Insight, a cloud-based EDR platform that analyzes more than 30 billion endpoint events per day from millions of sensors deployed across 176 countries.

READ MORE

Tanium: EDR Product Overview and Insight

|

We review Tanium's EDR solution, which can scale to millions of endpoints with requiring additional infrastructure.

READ MORE

Cisco AMP for Endpoints: EDR Product Overview and Insight

|

We review Cisco AMP for Endpoints, an EDR solution with a 100% score from NSS Labs for malware and exploit detection and the ability to block 20 billion threats a day.

READ MORE

TOP IT SECURITY PRODUCTS RESOURCES

Top 10 SIEM Products

Ten SIEM products that can help you manage your overall IT security from a single tool.

READ MORE

SECURITY DAILY NEWSLETTER

GET SECURITY NEWS IN YOUR INBOX EVERY DAY
|

TLS/SSL: Be Wary of What Travels Inside

Encrypted web communication routinely bypasses enterprise security controls. Left unscanned, these channels are perfect vehicles for hiding infection, command & control, and data..

TLS/SSL: Where Are We Today?

Encryption keeps data confidential, but we're left unprotected from threats that may be embedded in the data. In fact, encryption actually conceals these threats and adds network...

Breach Detection Systems: Product Selection Guide

Breach detection systems (BDS) are security products that offer timely detection of threats. When evaluating these products, customers must take into account traditional factors, such...

Advanced Endpoint Protection: When Should an Enterprise Move to AEP?

Advanced endpoint protection (AEP) products are still relatively immature, which makes it difficult to decide whether to replace or augment existing endpoint protection (EPP). Adding...

Advanced Endpoint Protection: Strategic Guidance

Replacing traditional antivirus (AV) with advanced endpoint protection (AEP) products may not be the best decision for every organization. If you do decide to switch, determining...
 
SEE ALL WHITEPAPERS
 
RSA NetWitness Endpoint: EDR Product Overview and Insight

RSA NetWitness Endpoint: EDR Product Overview and Insight

|

We review RSA NetWitness Endpoint, an EDR solution that uses behavior analytics, machine learning and threat intelligence to detect and prioritize threats.

READ MORE
Symantec Endpoint Protection: EDR Product Overview and Insight

Symantec Endpoint Protection: EDR Product Overview and Insight

|

We review Symantec Endpoint Protection with EDR, which can scale to hundreds of thousands of nodes and is supported by the world's largest threat intelligence network.

READ MORE
Cybereason Total Enterprise Protection: EDR Product Overview and Insight

Cybereason Total Enterprise Protection: EDR Product Overview and Insight

|

We review Cybereason Total Enterprise Protection, an EDR solution for companies of any size with little IT security expertise. It has unlimited scalability and can process 8 million questions a second.

READ MORE
Guidance Software EnCase Endpoint Security: EDR Product Overview and Insight

Guidance Software EnCase Endpoint Security: EDR Product Overview and Insight

|

We review Guidance Software EnCase Endpoint Security, an EDR solution that can scale to hundreds of thousands of nodes and can secure ATMs, POS systems and manufacturing devices.

READ MORE