Products

Best Disaster Recovery Solutions for 2022

Disaster recovery (DR) and business continuity have been an essential aspect of enterprise IT for decades. Whether it's earthquakes, floods, or power outages, DR is there to ensure operations can con...

Our Top Security Vendor Methodology

  We gather information from a range of IT industry sources for our top security products articles. Our most frequently used sources have been analyst firms Gartner...

Top Security Tools & Software for SMBs in 2022

Small businesses generally don’t have time to dip into logs several times a day, monitor every aspect of endpoint security via complex management consoles, or jump from point product to point product...

NordLayer Review: A VPN for the Zero Trust Era

Many companies use Virtual Public Networks (VPNs) to connect between their remote resources and their local networks. However, many of these VPN solutions have three significant issues. First, VPN...

Best Rootkit Scanners for 2022

A rootkit is a dangerous and stealthy malware type that enables hackers to access your computer or other software without your knowledge. Organizations employ rootkit scanners to detect and remove ro...

Getting Started With the Metasploit Framework: A Pentesting Tutorial

The Metasploit project contains some of the best security tools available, including the open source Metasploit Framework. Both pen testers and hackers use it to find and exploit vulnerabilities as ...

Most Security Product Buyers Aren’t Getting Promised Results: RSA Panel

About 90% of security buyers aren't getting the efficacy from their products that vendors claim they can deliver, according to a panel at this week's RSA Conference that also offered some solutions t...

Top GRC Tools & Software for 2022

Approximately 63 percent of organizations in the tech industry fell victim to a data breach in the last two years that led to leakage of protected data. Governance, risk and compliance (GRC) tools and...

Testing & Evaluating SIEM Systems: A Review of Rapid7 InsightIDR

As companies continue to get breached by the hour, IT and security teams are constantly scrambling their defenses in hopes of eradicating attackers from their networks. The (sort of) good news is th...

Getting Started with Rapid7 InsightIDR: A SIEM Tutorial

As part of our testing and review of Rapid7 InsightIDR, we looked at the SIEM product's functionality and ease of use in our lab environment. InsightIDR has SIEM at its foundation and scales ...

Latest articles