dcsimg

Drew Robb - Article Archives - Page 8

Auconet BICS: NAC Product Overview and Insight

July 7, 2017
Auconet's NAC solution can identify 60,000 devices per hour with 100% device discovery, and implementations can exceed 500,000 ports.
READ MORE

Impulse SafeConnect: NAC Product Overview and Insight

July 7, 2017
Impulse's network access control solution offers automatic device discovery and supports from 250 to 25,000 endpoints and up with its scalable appliance architecture.
READ MORE

Top 10 Endpoint Detection and Response (EDR) Solutions

June 22, 2017
Endpoint Detection and Response (EDR) solutions offer continuous monitoring and response to advanced security threats. Here are the top EDR vendors to consider.
READ MORE

CounterTack Endpoint Threat: EDR Product Overview and Insight

June 22, 2017
We review CounterTack's Endpoint Threat Platform, an EDR solution that can perform billions of scans per second and uses behavioral analysis, machine learning and reputational techniques to counter threats.
READ MORE

CrowdStrike Falcon Insight: EDR Product Overview and Insight

June 22, 2017
We review CrowdStrike Falcon Insight, a cloud-based EDR platform that analyzes more than 30 billion endpoint events per day from millions of sensors deployed across 176 countries.
READ MORE

Tanium: EDR Product Overview and Insight

June 22, 2017
We review Tanium's EDR solution, which can scale to millions of endpoints with requiring additional infrastructure.
READ MORE

Cisco AMP for Endpoints: EDR Product Overview and Insight

June 22, 2017
We review Cisco AMP for Endpoints, an EDR solution with a 100% score from NSS Labs for malware and exploit detection and the ability to block 20 billion threats a day.
READ MORE

RSA NetWitness Endpoint: EDR Product Overview and Insight

June 22, 2017
We review RSA NetWitness Endpoint, an EDR solution that uses behavior analytics, machine learning and threat intelligence to detect and prioritize threats.
READ MORE

Symantec Endpoint Protection: EDR Product Overview and Insight

June 22, 2017
We review Symantec Endpoint Protection with EDR, which can scale to hundreds of thousands of nodes and is supported by the world's largest threat intelligence network.
READ MORE

Cybereason Total Enterprise Protection: EDR Product Overview and Insight

June 22, 2017
We review Cybereason Total Enterprise Protection, an EDR solution for companies of any size with little IT security expertise. It has unlimited scalability and can process 8 million questions a second.
READ MORE

Guidance Software EnCase Endpoint Security: EDR Product Overview and Insight

June 22, 2017
We review Guidance Software EnCase Endpoint Security, an EDR solution that can scale to hundreds of thousands of nodes and can secure ATMs, POS systems and manufacturing devices.
READ MORE

Carbon Black Cb Response: EDR Product Overview and Insight

June 22, 2017
We review Carbon Black Cb Response, an EDR solution that boasts a CIA and NSA cybersecurity pedigree and supports 150,000 endpoints per cluster with unlimited scalability.
READ MORE

FireEye Endpoint Security: EDR Product Overview and Insight

June 22, 2017
We review FireEye Endpoint Security, an EDR solution for organizations with 250 to 350,000 endpoints, with a cloud option for smaller companies.
READ MORE

Network Firewalls: How to Protect Your Network from Unauthorized Access

April 18, 2017
They lack the buzz of more recent security innovations, so network firewalls can be overlooked. Yet firewalls are an essential aspect of any security strategy. We cover the basics of network firewall technology and look at the latest in next-generation firewalls.
READ MORE

SAS Tackles the Cybersecurity Analytics Challenge

April 14, 2017
Cybersecurity analytics is far from perfect, so data analytics pioneer SAS is hoping its expertise can help make it easier.
READ MORE

Identity and Access Management: Balancing Access and Security

April 7, 2017
In an era where hackers seem to have the upper hand, organizations can take greater control of networks and data with Identity and Access Management (IAM). We outline IAM security technology and solutions and discuss how to utilize it to protect your business.
READ MORE

Threat Intelligence and Analytics: Staying Ahead of Cyber Criminals

March 21, 2017
Threat intelligence is the best way to stay one step ahead of cyber criminals and prevent information or financial losses. We offer a thorough overview of cyber threat intelligence and how to implement it in your business.
READ MORE

Securing the Internet of Things

March 7, 2017
Internet of Things security is a nightmare in the making. Learn what smart enterprises can do to secure their IoT deployments.
READ MORE

Single Sign-On Buying Guide

December 21, 2016
Deploying a single sign-on system can improve productivity and lead to better password hygiene, but it also carries some risks.
READ MORE