Products

Top Cybersecurity Startups to Watch in 2022

Information security products, services, and professionals have never been in higher demand, making for a world of opportunities for cybersecurity startups. Investors recognize the potential too,...

Top Network Detection & Response (NDR) Solutions

In the race to offer comprehensive cybersecurity solutions, the product known as network detection and response (NDR) is a standalone solution as well as a central component of XDR. Whereas ol...

Best Open-Source Distributions for Pentesting and Forensics

Linux has an extensive range of open-source distributions that pentesters, ethical hackers and network defenders can use in their work, whether for pentesting, digital forensics or other cybersecurit...

eSecurity Planet’s 2022 Cybersecurity Product Awards

The editors of eSecurity Planet have been giving advice to enterprise security buyers for more than a decade, and for the last five years we've been rating the top enterprise cybersecurity products, ...

Best SIEM Tools & Software for 2022

Security Information and Event Management (SIEM) is a crucial enterprise technology that ties the stack of cybersecurity systems together to assess threats and manage risks. This guide evaluat...

Best Encryption Software for 2022

It's been a couple of decades since data tapes delivered by trucks made encryption a standard enterprise cybersecurity practice. Yet even as technology has changed, sending and receiving data remains...

Best Zero Trust Security Solutions for 2022

A presidential executive order mandating a zero trust strategy for federal agencies has raised the profile of the cybersecurity technology and prompted many non-government IT security managers to co...

Top 20 Breach and Attack Simulation (BAS) Vendors for 2022

Breach and attack simulation (BAS) remains a newer IT security technology, but its capabilities are increasingly essential to vigilance in a world of zero-day threats. BAS can automatically sp...

Top Endpoint Detection & Response (EDR) Solutions in 2022

  Endpoint security is a cornerstone of IT security. To help you navigate this growing and fast-changing cybersecurity market, our team has researched and analyzed this list of t...

Best User and Entity Behavior Analytics (UEBA) Tools for 2022

User and entity behavior analytics (UEBA) tools burst onto the scene a few years ago. Some vendors still call it by that term. But others use user behavior analytics (UBA), threat analytics, and secu...

Latest articles