dcsimg

Drew Robb - Article Archives - Page 7

FireEye Endpoint Security: EDR Product Overview and Insight

June 22, 2017
We review FireEye Endpoint Security, an EDR solution for organizations with 250 to 350,000 endpoints, with a cloud option for smaller companies.
READ MORE

Top 10 SIEM Products

June 5, 2017
Ten SIEM products that can help you manage your overall IT security from a single tool.
READ MORE

RSA NetWitness Suite - SIEM Product Overview and Insight

June 5, 2017
An in-depth look at RSA NetWitness Suite, which can process 30,000 events per second, ingest up to 10Gbps and support up to 100,000 endpoints per scalable system.
READ MORE

McAfee Enterprise Security Manager (ESM) - SIEM Product Overview and Insight

June 5, 2017
We take an in-depth look at McAfee Enterprise Security Manager (ESM), which processes tens of thousands of events per second and can store billions of events and flows.
READ MORE

IBM Security QRadar - SIEM Product Overview and Insight

June 5, 2017
We review IBM Security QRadar SIEM, which boasts more than 400 support modules for ingesting data and can process millions of security events per second.
READ MORE

Micro Focus ArcSight - SIEM Product Overview and Insight

June 5, 2017
We review Micro Focus ArcSight, an enterprise-class SIEM system that can ingest data from more than 350 sources and process up to 75,000 security events per second.
READ MORE

Trustwave SIEM Enterprise - SIEM Product Overview and Insight

June 5, 2017
An in-depth look at Trustwave SIEM Enterprise and Log Management Enterprise, SIEM solutions for the mid-market and enterprise that can retain data from millions of daily events for up to five years.
READ MORE

Micro Focus Sentinel Enterprise - SIEM Product Overview and Insight

June 5, 2017
We take an in-depth look at Micro Focus Sentinel Enterprise, a SIEM aimed at managed security services providers (MSSPs) and enterprises with distributed IT environments.
READ MORE

SolarWinds Log & Event Manager - SIEM Product Overview and Insight

June 5, 2017
An in-depth look at SolarWinds Log & Event Manager, an easy to use, lower-cost SIEM option that offers automated incident response.
READ MORE

AlienVault Unified Security Management (USM) - SIEM Product Overview and Insight

June 5, 2017
We review AlienVault Unified Security Management (USM), a lower-cost SIEM option thanks to its open source Open Threat Exchange (OTX).
READ MORE

Network Firewalls: How to Protect Your Network from Unauthorized Access

April 18, 2017
They lack the buzz of more recent security innovations, so network firewalls can be overlooked. Yet firewalls are an essential aspect of any security strategy. We cover the basics of network firewall technology and look at the latest in next-generation firewalls.
READ MORE

SAS Tackles the Cybersecurity Analytics Challenge

April 14, 2017
Cybersecurity analytics is far from perfect, so data analytics pioneer SAS is hoping its expertise can help make it easier.
READ MORE

Identity and Access Management: Balancing Access and Security

April 7, 2017
In an era where hackers seem to have the upper hand, organizations can take greater control of networks and data with Identity and Access Management (IAM). We outline IAM security technology and solutions and discuss how to utilize it to protect your business.
READ MORE

Threat Intelligence and Analytics: Staying Ahead of Cyber Criminals

March 21, 2017
Threat intelligence is the best way to stay one step ahead of cyber criminals and prevent information or financial losses. We offer a thorough overview of cyber threat intelligence and how to implement it in your business.
READ MORE

Securing the Internet of Things

March 7, 2017
Internet of Things security is a nightmare in the making. Learn what smart enterprises can do to secure their IoT deployments.
READ MORE

Single Sign-On Buying Guide

December 21, 2016
Deploying a single sign-on system can improve productivity and lead to better password hygiene, but it also carries some risks.
READ MORE

Guide to Getting the Right Single Sign-on Solution

September 29, 2016
Single sign-on solutions help users cope with password pressures by enabling a single authentication event to offer access to multiple applications.
READ MORE

How to Mitigate Fourth-Party Security Risks

August 15, 2016
What do you know about your vendors' vendors? Fourth-party security risks can be serious. How can you mitigate them?
READ MORE

Advanced Threat Detection Buying Guide

September 3, 2015
Advanced threat detection offers a more proactive approach to enterprise security than traditional perimeter defenses.
READ MORE