The top cybersecurity products, chosen by our expert staff based on our in-depth analysis of the market for security tools.
See the complete list of top 10 Endpoint Detection and Response solutions. Company description: Guidance software was founded in 1997 and went public in 2007. It trades on the NASDAQ under GUID. Product description: EnCase Endpoint Security provides kernel-level visibility at the endpoint for detection and response. It enables early detection of signs of intrusion,… Read more
See the complete list of top 10 Endpoint Detection and Response solutions. Company description: Cisco began as a networking pioneer more than 30 years ago, then became a major player in storage before moving into other areas of IT including security. It trades on NASDAQ as CSCO. Product description: Cisco AMP (Advanced Malware Protection) for… Read more
See the complete list of top 10 Endpoint Detection and Response solutions. Company description: FireEye bills itself as the intelligence-led security company. It offers a single platform that blends security technologies, threat intelligence, and consulting. It has more than 5,800 customers across 67 countries, including more than 40 percent of the Forbes Global 2000. FireEye… Read more
When warning about the risks of website attacks like SQL injection and remote file inclusion, we often talk about how these breaches can reveal “sensitive data.” What kind of sensitive data? Well, lots of kinds, such as personal data about account holders or privileged information like internal business documents. But the kind of sensitive data… Read more
The effectiveness of malware detection, how well it catches infections, is the chief characteristic to consider when choosing an antivirus program. But resource consumption, how much system resources it uses, is also important. This is especially true on older machines where heavy duty usage by your AV software can bog down the system and… Read more
SUPERAntiSpyware recently released version 5 of their antispyware and malware protection program, which they call their most significant update ever. In this review, we’ll take a look at the updates in regards to both the free and premium editions of SUPERAntiSpyware 5. We’ll see if it’s worth your time and money to use the free… Read more
The traditional stateful firewall filters traffic based upon ports and protocols. For example, blocking or allowing the entire port 80 for HTTP traffic or port 443 for HTTPS traffic. It’s an “all-or-nothing” approach. Newer firewall technology can also filter traffic based upon the applications or traffic types traversing these ports. For example, you could open… Read more
The first thing to do is determine the validity of any antivirus alerts. A popular malware technique is to display alerts saying a computer is infected in hopes of the user downloading more malware and/or paying for fake antivirus protection.These programs are often called scareware or Trojan horses. If you receive any antivirus alerts,… Read more
If your SSL server have misconfigurations and known vulnerabilities that make it insecure, follow these ten tips to avoid common SSL security mistakes. 1. Disable support for SSL v2 – This version of the SSL protocol was shown to be insecure over 15 years ago, but many web servers still support it. Disabling it… Read more