Products

The top cybersecurity products, chosen by our expert staff based on our in-depth analysis of the market for security tools.

  • Guidance Software EnCase Endpoint Security: EDR Product Overview and Insight

    See the complete list of top 10 Endpoint Detection and Response solutions. Company description: Guidance software was founded in 1997 and went public in 2007. It trades on the NASDAQ under GUID. Product description: EnCase Endpoint Security provides kernel-level visibility at the endpoint for detection and response. It enables early detection of signs of intrusion,… Read more


  • Cisco AMP for Endpoints Features & Pricing

    See the complete list of top 10 Endpoint Detection and Response solutions. Company description: Cisco began as a networking pioneer more than 30 years ago, then became a major player in storage before moving into other areas of IT including security. It trades on NASDAQ as CSCO. Product description: Cisco AMP (Advanced Malware Protection) for… Read more


  • FireEye Endpoint Features & Pricing

    See the complete list of top 10 Endpoint Detection and Response solutions. Company description: FireEye bills itself as the intelligence-led security company. It offers a single platform that blends security technologies, threat intelligence, and consulting. It has more than 5,800 customers across 67 countries, including more than 40 percent of the Forbes Global 2000. FireEye… Read more


  • How to Prevent Password Encryption Exploits

    When warning about the risks of website attacks like SQL injection and remote file inclusion, we often talk about how these breaches can reveal “sensitive data.” What kind of sensitive data? Well, lots of kinds, such as personal data about account holders or privileged information like internal business documents. But the kind of sensitive data… Read more


  • Is Your Free AV a System Hog?

      The effectiveness of malware detection, how well it catches infections, is the chief characteristic to consider when choosing an antivirus program. But resource consumption, how much system resources it uses, is also important. This is especially true on older machines where heavy duty usage by your AV software can bog down the system and… Read more


  • Review: SUPERAntiSpyware 5

    SUPERAntiSpyware recently released version 5 of their antispyware and malware protection program, which they call their most significant update ever. In this review, we’ll take a look at the updates in regards to both the free and premium editions of SUPERAntiSpyware 5. We’ll see if it’s worth your time and money to use the free… Read more


  • Intro to Next Generation Firewalls

    The traditional stateful firewall filters traffic based upon ports and protocols. For example, blocking or allowing the entire port 80 for HTTP traffic or port 443 for HTTPS traffic. It’s an “all-or-nothing” approach. Newer firewall technology can also filter traffic based upon the applications or traffic types traversing these ports. For example, you could open… Read more


  • Linux Hardening – Quick Wins

    The best way to ensure that your Linux server is secure is to build it from scratch with a minimum amount of code that can be exploited by a hacker — a custom compiled kernel and the bare minimum of packages needed for the server to do its intended job.   But what if you… Read more


  • More Tips on Removing Viruses and Malware

      The first thing to do is determine the validity of any antivirus alerts. A popular malware technique is to display alerts saying a computer is infected in hopes of the user downloading more malware and/or paying for fake antivirus protection.These programs are often called scareware or Trojan horses. If you receive any antivirus alerts,… Read more


  • Ten Tips to Make Your SSL Secure

    If your SSL server have misconfigurations and known vulnerabilities that make it insecure, follow these ten tips to avoid common SSL security mistakes.   1. Disable support for SSL v2 – This version of the SSL protocol was shown to be insecure over 15 years ago, but many web servers still support it. Disabling it… Read more


Top Cybersecurity Companies

Get the Free Newsletter!

Subscribe to Cybersecurity Insider for top news, trends & analysis