Drew Robb - Article Archives - Page 1

Deceiving the Deceivers: Deception Technology Emerges as an IT Security Defense Strategy

September 6, 2017
Deception technology is becoming a critical IT security defense strategy. We outline how deception tools work and the vendors to watch.
READ MORE

Top 10 Enterprise Encryption Products

August 15, 2017
Encryption remains a mainstay of IT security technology, a critical tool for protecting sensitive data. We evaluate the top encryption solutions.
READ MORE

IBM Guardium Data Encryption: Product Overview and Analysis

August 15, 2017
We review IBM Guardium Data, which performs encryption and decryption with minimal performance hit and requires no changes to databases, apps or networks.
READ MORE

Eset DESlock: Encryption Product Overview and Analysis

August 15, 2017
We review Eset DESlock, an enterprise encryption tool that allows remote device wipe and control and ease of management and use.
READ MORE

Dell Encryption Enterprise: Product Overview and Analysis

August 15, 2017
We review Dell Encryption Enterprise, which offers encryption that protects all data types regardless of device, operating system or location.
READ MORE

McAfee Complete Data Protection: Encryption Product Overview and Analysis

August 15, 2017
We review McAfee Complete Data Protection, which offers encryption as part of a suite that includes DLP, device control, and protection for cloud storage.
READ MORE

HPE SecureData: Encryption Product Overview and Analysis

August 15, 2017
We review HPE SecureData, an enterprise security solution that offers end-to-end data protection, securing data at rest, in motion and in use.
READ MORE

Bitdefender GravityZone: Encryption Product Overview and Analysis

August 15, 2017
We review Bitdefender GravityZone, which leverages capabilities provided by Windows and Mac platforms and takes advantage of the native device encryption.
READ MORE

Sophos SafeGuard: Encryption Product Overview and Analysis

August 15, 2017
We review Sophos SafeGuard, an encryption product that offers endpoint security checks and role- and application-based access and encryption.
READ MORE

Symantec Encryption: Product Overview and Analysis

August 15, 2017
We review Symantec's encryption products, which offer endpoint, email and file encryption, policy enforcement and data loss prevention (DLP).
READ MORE

Trend Micro Endpoint Encryption: Product Overview and Analysis

August 15, 2017
We review Trend Micro Endpoint Encryption, which offers full disk, folder, file and removable media encryption, along with central security management.
READ MORE

Check Point Full Disk Encryption Software Blade: Product Overview and Analysis

August 15, 2017
We review Check Point Full Disk Encryption Software Blade, which provides automatic security for all information on endpoint hard drives.
READ MORE

Eight Top Threat Intelligence Companies

July 18, 2017
Threat intelligence platforms have become a critical security tool as the volume and complexity of threat vectors grows exponentially. We review the top vendors in this critical area.
READ MORE

IBM X-Force: Threat Intelligence Product Overview and Insight

July 18, 2017
We review IBM X-Force Exchange, a collaborative threat intelligence platform that helps security analysts research threat indicators to speed time to action.
READ MORE

RSA NetWitness Suite: Threat Intelligence Product Overview and Insight

July 18, 2017
We review RSA NetWitness Suite, a threat detection and response platform that lets security teams rapidly detect and understand the scope of a compromise.
READ MORE

Palo Alto Networks AutoFocus: Threat Intelligence Product Overview and Insight

July 18, 2017
We review Palo Alto Networks AutoFocus, a contextual threat intelligence service that makes threat analytics available to organizations of all sizes.
READ MORE

Anomali ThreatStream: Threat Intelligence Product Overview and Insight

July 18, 2017
We review Anomali ThreatStream, which aggregates millions of threat indicators to identify attacks and breaches and help security teams contain threats.
READ MORE

LogRhythm Threat Lifecycle Management: Threat Intelligence Product Overview and Insight

July 18, 2017
We review LogRhythm Threat Lifecycle Management Platform, which delivers data analysis and capabilities for rapid detection and response.
READ MORE

FireEye iSIGHT: Threat Intelligence Product Overview and Insight

July 18, 2017
We review FireEye iSIGHT Threat Intelligence, which adds context and priority to global threats before, during and after an attack.
READ MORE

SECURITY DAILY NEWSLETTER

GET SECURITY NEWS IN YOUR INBOX EVERY DAY
|