Drew Robb Avatar
  • CrowdStrike Falcon Insight: EDR Product Overview and Features

      See the complete list of top Endpoint Detection and Response solutions. Company description: CrowdStrike was founded in 2011 to fix sophisticated attacks that were forcing businesses into the headlines and could not be solved with existing malware-based defenses. Co-founders George Kurtz and Dmitri Alperovitch combined the endpoint protection with intelligence to pinpoint adversaries. It […]

  • Aircrack-ng: Pen Testing Product Overview and Analysis

    See our complete list of top penetration testing tools. Aircrack-ng Overview Aircrack-ng is the go-to tool for analyzing and cracking wireless networks. All the various tools within it use a command line interface and are set up for scripting. This is good news for veteran security professionals, but an open-source Linux orientation may challenge those […]

  • Wireshark: Pen Testing Product Overview and Analysis

    See our complete list of top penetration testing tools. Bottom Line Wireshark is often found in the security toolkit. Pen testers use it to point out what is happening with the network and to assess traffic for vulnerabilities in real time. By reviewing connection-level information as well as the constituents of data packets, it highlights […]

  • Fiddler: Pen Testing Product Overview and Analysis

    See our complete list of top penetration testing tools. Bottom Line Fiddler is a useful collection of manual tools for dealing with web debugging, web session manipulation, and security and performance testing. However, it is probably most useful for those deploying the paid version on the .NET framework, as that comes with many automation features. […]

  • Nessus: Pen Testing Product Overview and Analysis

    See our complete list of top penetration testing tools. Bottom Line Nessus is a widely used paid vulnerability assessment tool that is best for experienced security teams, as its interface can be a little tricky to master at first. It should be used in conjunction with pen testing tools, providing them with areas to target […]

  • Metasploit: Pen Testing Product Overview and Analysis

      See our complete list of top penetration testing tools. The Bottom Line Rapid7’s Metasploit scans and tests for vulnerabilities. Backed by a huge open-source database of known exploits, it provides IT security teams with an analysis of pen testing results so remediation steps can be done efficiently. However, it doesn’t scale up to enterprise […]

  • Burp Scanner Features & Pricing

      See our complete list of top penetration testing tools. The Bottom Line PortSwigger Web Security’s Burp is a top-rated web vulnerability scanner used in many organizations and is found in most penetration testing toolkits, though its strength is more on the scanning side than on penetration. A free version is limited in functionality, so […]

  • IBM Authentication Solutions: Single Sign-On Overview and Analysis

    See our complete list of Top SSO Solutions Bottom Line IBM Security Access Manager (ISAM) is feature-rich but on-premises only. IBM is playing catchup through another SSO product for the cloud known as Cloud Identity. Current IBM customers and enterprises looking for a feature-rich, on-premises deployment with high throughput should consider ISAM. Those looking for […]

  • CA Single Sign-On: Product Overview and Analysis

      See our complete list of Top SSO Solutions Bottom Line CA Single Sign-On provides access management for mobile, web and SaaS applications. It is best for large enterprise environments operating in the cloud, on-premises, or both. Not as suitable for SMEs. Product Description CA Single Sign-On (CA SSO) provides access management for mobile, web […]

  • Microsoft Azure Active Directory: Single Sign-On Overview and Analysis

      See our complete list of Top SSO Solutions Bottom Line Microsoft Azure AD is almost a no-brainer for anyone deploying Microsoft Azure widely. With support for on-premises integration and synchronization, it is gaining traction as an SSO solution for large or small organizations. Product Description Microsoft Azure Active Directory (Azure AD) uses an identity […]

Top Cybersecurity Companies

Top 10 Cybersecurity Companies

See full list

Get the Free Newsletter!

Subscribe to Cybersecurity Insider for top news, trends & analysis