dcsimg

Drew Robb - Article Archives - Page 7

Symantec Encryption: Product Overview and Analysis

August 15, 2017
We review Symantec's encryption products, which offer endpoint, email and file encryption, policy enforcement and data loss prevention (DLP).
READ MORE

Trend Micro Endpoint Encryption: Product Overview and Analysis

August 15, 2017
We review Trend Micro Endpoint Encryption, which offers full disk, folder, file and removable media encryption, along with central security management.
READ MORE

Check Point Full Disk Encryption Software Blade: Product Overview and Analysis

August 15, 2017
We review Check Point Full Disk Encryption Software Blade, which provides automatic security for all information on endpoint hard drives.
READ MORE

Eight Top Threat Intelligence Platforms

July 18, 2017
Threat intelligence platforms have become a critical security tool as the volume and complexity of threat vectors grows exponentially. We review the top vendors in this critical area.
READ MORE

IBM X-Force: Threat Intelligence Product Overview and Insight

July 18, 2017
We review IBM X-Force Exchange, a collaborative threat intelligence platform that helps security analysts research threat indicators to speed time to action.
READ MORE

RSA NetWitness Suite: Threat Intelligence Product Overview and Insight

July 18, 2017
We review RSA NetWitness Suite, a threat detection and response platform that lets security teams rapidly detect and understand the scope of a compromise.
READ MORE

Palo Alto Networks AutoFocus: Threat Intelligence Product Overview and Insight

July 18, 2017
We review Palo Alto Networks AutoFocus, a contextual threat intelligence service that makes threat analytics available to organizations of all sizes.
READ MORE

Anomali ThreatStream: Threat Intelligence Product Overview and Insight

July 18, 2017
We review Anomali ThreatStream, which aggregates millions of threat indicators to identify attacks and breaches and help security teams contain threats.
READ MORE

LogRhythm Threat Lifecycle Management: Threat Intelligence Product Overview and Insight

July 18, 2017
We review LogRhythm Threat Lifecycle Management Platform, which delivers data analysis and capabilities for rapid detection and response.
READ MORE

FireEye iSIGHT: Threat Intelligence Product Overview and Insight

July 18, 2017
We review FireEye iSIGHT Threat Intelligence, which adds context and priority to global threats before, during and after an attack.
READ MORE

LookingGlass Cyber Solutions: Threat Intelligence Product Overview and Insight

July 18, 2017
We review LookingGlass Cyber Solutions, an open source-based threat intelligence platform that offers unified threat protection against sophisticated cyberattacks.
READ MORE

AlienVault Unified Security Management: Threat Intelligence Product Overview and Insight

July 18, 2017
We review AlienVault Unified Security Management, which taps AlienVault Labs and a massive crowd-sourced exchange to identify and respond to threats.
READ MORE

9 Top Network Access Control (NAC) Solutions

July 7, 2017
Network access control is critical for controlling the security of devices that attach to your network. Here are nine NAC solutions to consider.
READ MORE

Cisco Identity Services Engine: NAC Product Overview and Insight

July 7, 2017
Cisco's NAC solution supports up to 500,000 concurrent sessions and 1.5 million endpoints per deployment and includes adaptive intelligence.
READ MORE

HPE Aruba ClearPass: NAC Product Overview and Insight

July 7, 2017
HPE Aruba's ClearPass network access control (NAC) solution is suited for high-volume authentication environments and distributed enterprises.
READ MORE

InfoExpress CyberGatekeeper: NAC Product Overview and Insight

July 7, 2017
The InfoExpress NAC solution automatically discovers devices before granting network access. It is popular with large educational clients.
READ MORE

Bradford Networks: NAC Product Overview and Insight

July 7, 2017
Bradford Networks' network access control (NAC) solution supports more than 1,500 networking devices and offers automated threat response.
READ MORE

Pulse Policy Secure: NAC Product Overview and Insight

July 7, 2017
Pulse Policy's NAC solution supports up to 50,000 concurrent users and offers automatic deployment and threat intelligence options.
READ MORE

ForeScout CounterACT: NAC Product Overview and Insight

July 7, 2017
ForeScout's NAC solution boasts implementations of more than a million endpoints and can protect medical devices too.
READ MORE