Features
Features
-
Windows 10 Wi-Fi Sense for hotspot sharing: Is it safe?
Microsoft's Windows 10 Wi-Fi Sense was designed to make hotspot sharing easy, but experts debate if the security risks are real and whether the new feature offers substantial benefits and relative safety. Continue Reading
-
Readers' top picks for DLP products
The companies and DLP products that organizations consider, when they seek to address compliance and data security requirements across multiple platforms and environments. Continue Reading
-
Deconstructing the emergency incident response process
Professional incident response providers can quickly bring the additional resources and the expertise that companies often need to handle a rapidly unfolding threat. Continue Reading
-
Security attack? New defenses in 2016 escape compromise
Worried that attackers may know your infrastructure better than you do? Cyberthreats are learning fast from defenses that detect them. New strategies focus on what happens next. Continue Reading
-
Dell SonicWall NSA UTM: Product overview
Expert David Strom explains why the feature-rich Dell SonicWall NSA Series of enterprise unified threat management devices may take some getting used to. Continue Reading
-
WatchGuard UTM appliances: Product overview
Expert Ed Tittel examines WatchGuard UTM appliances that bundle different kinds of network infrastructure protection into a single device for small, midsize and large businesses. Continue Reading
-
Sophos SG Series UTM: Product overview
Expert Ed Tittel looks at the Sophos SG Series of unified threat management appliances, which bundle various kinds of network infrastructure protection into a single device. Continue Reading
-
Fortinet FortiGate UTM: Product overview
Expert Ed Tittel looks at Fortinet FortiGate UTM appliances, which combine different network infrastructure protection features into a single device. Continue Reading
-
Cisco Meraki MX appliances: UTM product overview
Expert Ed Tittel examines Cisco's Meraki MX UTM Appliances, a series of UTM products that combines various network security and protection features into a single device. Continue Reading
-
Check Point UTM Threat Prevention Appliances: Product review
Check Point UTM Threat Prevention Appliances are recognized by our reviewer as consistent software architectures that are easy to configure. Continue Reading
-
Seven criteria for buying vulnerability management tools
Expert contributor Ed Tittel describes purchasing criteria for full-featured vulnerability management tools for small organizations to large enterprises. Continue Reading
-
The business case for vulnerability management tools
Expert Ed Tittel describes business use cases for vulnerability management tools and examines how organizations of all sizes benefit from these products. Continue Reading
-
Introduction to vulnerability management tools
Expert Ed Tittel explores how vulnerability management tools can help organizations of all sizes uncover defense weaknesses and close security gaps before they are exploited by attackers. Continue Reading
-
Trend Micro InterScan Messaging Security: Product overview
Expert Karen Scarfone looks at the Trend Micro InterScan Messaging Security and Trend Micro ScanMail Suite for Microsoft Exchange email security gateway products used for monitoring email messages that could contain suspicious content and threats. Continue Reading
-
Symantec Messaging Gateway and Symantec Email Security.cloud: Product overview
Expert Karen Scarfone examines the Symantec Messaging Gateway and Symantec Email Security.cloud email security gateway products that detects and blocks messages that contain suspicious content and threats. Continue Reading
-
Sophos Email Appliance: Product overview
Expert Karen Scarfone examines the Sophos Email Appliance email security gateway product that is used for detecting and blocking messages that contain suspicious content and threats. Continue Reading
-
Proofpoint Enterprise Protection: Product overview
Expert Karen Scarfone examines the Proofpoint Enterprise Protection email security gateway product, which scans inbound and outbound email messages for malware, phishing and spam threats. Continue Reading
-
Microsoft Exchange Online Protection: Product overview
Expert Karen Scarfone reviews the Microsoft Exchange Online Protection email security gateway product, which is used for detecting and blocking common email-transmitted threats. Continue Reading
-
McAfee Email Protection, Security for Email Servers: Product overview
Expert Karen Scarfone reviews the McAfee Email Protection and McAfee Security for Email Servers products that are used for monitoring, blocking and quarantining email messages. Continue Reading
-
Clearswift SECURE Email Gateway: Product overview
Expert Karen Scarfone reviews the Clearswift SECURE Email Gateway product, which monitors incoming and outgoing emails. Continue Reading
-
Fortinet FortiMail: Product overview
Expert Karen Scarfone reviews the Fortinet FortiMail email security gateway product that is used for monitoring email messages on behalf of an organization. Continue Reading
-
Cybersecurity professionals: Five ways to increase the talent pool
The lack of cybersecurity skills in the industry is glaring, but there are ways for educators, vendors and enterprises to fix the problem. Sean Martin explains how. Continue Reading
-
Websense Email Security Gateway: Product overview
Expert Karen Scarfone reviews the Websense Email Security Gateway product, which is used for monitoring email messages that could contain suspicious threats. Continue Reading
-
Cisco Email Security Appliance: Product overview
Expert Karen Scarfone reviews Cisco's Email Security Appliance product that is designed for detecting and blocking email-borne threats. Continue Reading
-
How to amp up enterprise security with a suite of tools
Vendors are increasingly offering security via a suite of tools. Here's how to use them to improve enterprise security while avoiding the drawbacks like functions overlap. Continue Reading
-
Readers' top picks for application security tools
The top companies and application security products that organizations consider when they seek to reduce their application vulnerabilities. Continue Reading
-
Virtualization security tools defend across clouds
Several vendors offer ways to protect virtual machines both in the data center and in the cloud. How do these products differ from what's available from VMware or Amazon Web Services? Continue Reading
-
Integrated security suite? How to avoid tool overlap
The versatility of Swiss Army knife-like platforms may override existing security controls. Here's how to cut out overlap and get the most function out of multi-tools. Continue Reading
-
Five factors for evaluating big data security analytics platforms
Expert Dan Sullivan outlines criteria for evaluating big data security analytics platforms for collecting, analyzing and managing large volumes of data generated for information security purposes. Continue Reading
-
The business case for big data security analytics
Expert Dan Sullivan explores the emerging category of big data security analytics and outlines the vital capabilities and key benefits of the technology for enterprises. Continue Reading
-
Hewlett Packard Enterprise's ArcSight ESM: SIEM product overview
Expert Karen Scarfone analyzes HPE's ArcSight Enterprise Security Management (ESM), a security information and event management (SIEM) tool used for collecting security log data. Continue Reading
-
EMC RSA Security Analytics: SIEM product overview
Expert Karen Scarfone examines EMC RSA Security Analytics, a SIEM product for harvesting, analyzing and reporting on security log data across the enterprise. Continue Reading
-
AlienVault OSSIM: SIEM Product overview
Expert Karen Scarfone checks out AlienVault's Open Source SIEM and Unified Security Management products for collecting event data from various security logs within an organization. Continue Reading
-
Splunk Enterprise: SIEM product overview
Expert Karen Scarfone examines Splunk Enterprise, a security information and event management (SIEM) product for collecting and analyzing event data to identify malicious activity. Continue Reading
-
SolarWinds Log and Event Manager: SIEM product overview
Expert Karen Scarfone examines SolarWinds Log and Event Manager, a security information and event management (SIEM) tool for collecting and analyzing event data to identify malicious activity. Continue Reading
-
IBM Security QRadar: SIEM product overview
Expert Karen Scarfone takes a look at IBM Security QRadar, a security information and event management (SIEM) tool used for collecting and analyzing security log data. Continue Reading
-
LogRhythm's Security Intelligence Platform: SIEM product overview
Expert Karen Scarfone examines LogRhythm's Security Intelligence Platform, a SIEM tool for analyzing collected data. Continue Reading
-
Introduction to big data security analytics in the enterprise
Expert Dan Sullivan explains what big data security analytics is and how these tools are applied to security monitoring to enable broader and more in-depth event analysis for better enterprise protection. Continue Reading
-
Comparing the best intrusion prevention systems
Expert contributor Karen Scarfone examines the best intrusion prevention systems to help you determine which IPS products may be best for your organization. Continue Reading
-
Lessons in mobile data loss protection for enterprise IT pros
With mobile devices everywhere in the enterprise now, learning tactics for data loss protection must become an IT priority. Continue Reading
-
Comparing the top Web fraud detection systems
Expert Ed Tittel explores the features of the top Web fraud detection systems and compares critical purchasing criteria. Continue Reading
-
Drowning in a sea of cybersecurity tools?
Here’s how to conquer the steady stream of new technologies and find the best security tools beyond point solutions. Continue Reading
-
Readers’ top picks for advanced threat detection
Companies and functionality organizations are targeting when they seek to bolster their defenses through threat detection and analytics. Continue Reading
-
Readers’ top picks for enterprise firewalls
The companies and key functionality organizations seek out when they upgrade or add firewall technology to their enterprise environments. Continue Reading
-
Leaky enterprise: Data loss tops mobile security threats
With the absence of high-profile breaches, mobile data protection is still on the backburner at some organizations. Why it’s time to change course. Continue Reading
-
Three criteria for selecting the right IPS products
Expert contributor Karen Scarfone examines important criteria for evaluating intrusion prevention system (IPS) products for use by an organization. Continue Reading
-
Vormetric Transparent Encryption: Product overview
Expert Ed Tittel takes a look at Vormetric Transparent Encryption, a component of Vormetric's Data Security Platform that encrypts data and does access control for that data. Continue Reading
-
HP Security Voltage's SecureData Enterprise: Product overview
Expert Ed Tittel examines SecureData Enterprise, which is a part of the HP Security Voltage platform, a scalable database security product that encrypts both structured and unstructured data, tokenizing data to prevent viewing and more. Continue Reading
-
Trustwave DbProtect: Database security tool overview
Expert Ed Tittel checks out Trustwave DbProtect, a centrally managed enterprise-level database activity monitor that includes vulnerability assessment functionality. Continue Reading
-
Protegrity Database Protector: Database security tool overview
Expert Ed Tittel examines Protegrity Database Protector, a database security add-on product that provides column- and field-level protection of confidential and sensitive data stored in nearly any type of relational database. Continue Reading
-
Fortinet FortiDB: Database security tool overview
Expert Ed Tittel examines Fortinet FortiDB, an add-on product for better securing databases through database activity monitoring and vulnerability assessment. Continue Reading
-
Oracle Advanced Security: Database security tool overview
Expert Ed Tittel examines Oracle Advanced Security, a database security add-on product with transparent data encryption (TDE) and data redaction features. Continue Reading
-
McAfee Database Activity Monitoring: Database security tool overview
Expert Ed Tittel takes a look at McAfee Database Activity Monitoring and McAfee Vulnerability Manager for Databases to see how they protect enterprises' databases and corporate data. Continue Reading
-
Imperva SecureSphere: Database security tool overview
Expert Ed Tittel examines Imperva SecureSphere Database Activity Monitoring and Database Assessment, products that are deployed as an inline bridge or as a lightweight agent to assess and monitor local database access. Continue Reading
-
IBM Guardium: Database security tool overview
Expert Ed Tittel examines IBM Guardium, a security product that offers continuous, real-time, policy-based monitoring of database activities. Continue Reading
-
Enterprise benefits of network intrusion prevention systems
Expert Karen Scarfone explains how most organizations can benefit from intrusion prevention systems (IPSes), specifically dedicated hardware and software IPS technologies. Continue Reading
-
Windows 10 security fixes longtime OS vulnerabilities
Windows 10 security incorporates years of improvements to remove or mitigate long-term issues with Windows vulnerabilities. Continue Reading
-
The basics of network intrusion prevention systems
Expert Karen Scarfone explores intrusion prevention systems and their acquisition, deployment and management within the enterprise. Continue Reading
-
Five criteria for purchasing Web fraud detection systems
Expert Ed Tittel describes the purchasing criteria for Web fraud detection systems and explains how they can protect banking, e-commerce and other industries. Continue Reading
-
Emerging security threats you're up against now
Learn about the 'hacking as a service' and other emerging security threats. Continue Reading
-
Comparing the best data loss prevention products
Expert Bill Hayes examines the strengths and weaknesses of top-rated data loss prevention (DLP) products to help enterprises make the right purchasing decision. Continue Reading
-
Hacking and Penetration Testing with Low Power Devices
In this excerpt of Hacking and Penetration Testing with Low Power Devices, author Philip Polstra describes "The Deck" -- a custom Linux distribution -- that breaks the traditional penetration model by providing pen testers an OS that runs on ... Continue Reading
-
Cyber Reconnaissance, Surveillance and Defense
In this excerpt of Cyber Reconnaissance, Surveillance and Defense, author Robert Shimonski describes commonly used mobile technology and how phone tracking works. Continue Reading
-
Cyber Crime and Cyber Terrorism Investigator's Handbook
In this excerpt of Cyber Crime and Cyber Terrorism Investigator's Handbook, authors Babak Akhgar, Andrew Staniforth and Francesca Bosco outline the classification, types and categories of cybercrime. Continue Reading
-
Building an Information Security Awareness Program
In this excerpt of Building an Information Security Awareness Program, authors Bill Gardner and Valerie Thomas discuss why lecturing is an ineffective method of security awareness programs and offer alternative measures enterprises should consider. Continue Reading
-
Choose the best vulnerability assessment tools
This Buyer's Essentials guide helps InfoSec pros assess vulnerability management products by explaining how they work and by highlighting key features corporate buyers should look for so they can evaluate vendor offerings. Continue Reading
-
Cybersecurity investment pays more than monetary dividends
Companies are investing in cybersecurity startups to reap the benefits of working with problem-solving technology. Continue Reading
-
The CISO role rises: How is it working out?
An unusual game of musical chairs is unfolding as companies scramble to ensure information security and shore up their ranks to the tune of regulators. Continue Reading
-
Five supporting technologies for DLP products
Expert Bill Hayes examines five technologies that can complement data loss prevention products and improve enterprise security. Continue Reading
-
How to deploy the right DLP products for the right jobs
Expert Bill Hayes maps specific data loss prevention products to three deployment scenarios to better help readers make their own purchase decisions. Continue Reading
-
The best SSL VPN products in the market
SSL VPNs are essential for securing network connections and communications. Here's a look at the best SSL VPN products in the industry. Continue Reading
-
Comparing the best Web application firewalls in the industry
Expert Brad Causey compares the best Web application firewalls on the market across three types of product types: cloud, integrated and appliance. Continue Reading
-
Four enterprise scenarios for Web fraud detection systems
Expert Ed Tittel describes use cases for Web fraud detection systems and products and explains how they can increase account and transaction security. Continue Reading
-
Warnings, neglect and a massive OPM data breach
Why no one should have been surprised by the massive government Office of Personnel Management data hack. Continue Reading
-
App security: Surviving the merger and acquisition process
Some companies are trying to head off information security glitches before they sign on the dotted line, with help from security officers. Continue Reading
-
Introduction to Web fraud detection systems
Expert Ed Tittel explores the purpose of Web fraud detection systems and services, which are designed to reduce the risks inherent in electronic payments and e-commerce. Continue Reading
-
Comparing the top database security tools
Expert Ed Tittel examines the strengths and weaknesses of top-rated database security tools -- from database activity monitoring to transparent database encryption -- to help enterprises make the right purchasing decision. Continue Reading
-
Nine steps for purchasing database security tools
Expert Adrian Lane lays out the criteria for procuring the right database security software for your enterprise. Continue Reading
-
Developing an IAM strategy for third-party vendors
This Beyond the Page informs InfoSec pros of the security concerns related to third-party vendor access, and how an enterprise IAM strategy can help. Continue Reading
-
Comparing the top wireless intrusion prevention systems
Expert Karen Scarfone examines the top wireless intrusion prevention systems (WIPS) to help readers determine which may be best for them. Continue Reading
-
Cybersecurity skills shortage demands new workforce strategies
The race to find InfoSec professionals who can outpace advanced threats has companies worldwide facing hurdles. Continue Reading
-
Is BYOD policy the foundation for mastering enterprise mobility?
Today, many companies have adopted a mobile-first strategy. But when employees are left to their own devices, InfoSec pros face uncharted territory. Continue Reading
-
Is third-party access the next IAM frontier?
Identity and access management of employees is so complex that many companies have faltered when it comes to securing programs for trusted partners. Continue Reading
-
The top threat intelligence services for enterprises
Threat intelligence takes data from multiple sources and turns it into actionable, contextual information. Expert Ed Tittel takes a look at the top threat intelligence services. Continue Reading
-
LogRhythm Security Intelligence: Threat intelligence services overview
In this threat intelligence service overview, Expert Ed Tittel looks at the LogRhythm Security Intelligence threat intelligence platform, designed for simple setup and ease of use. Continue Reading
-
Comparing the best UTM products in the industry
Expert Ed Tittel examines the top unified threat management appliances to determine which one could be the best for your organization. Continue Reading
-
Six criteria for purchasing unified threat management appliances
Expert Ed Tittel explores key criteria for evaluating unified threat management (UTM) appliances to determine the best choice for your organization. Continue Reading
-
How UTM products can benefit your enterprise network environment
Expert Ed Tittel explains why unified threat management is the right holistic IT security approach for SMBs and how it can fit into the enterprise, as well. Continue Reading
-
Comparing the top security analytics tools in the industry
Expert Dan Sullivan examines the top security analytics products to help readers determine which may be best for their organization. Continue Reading
-
Tips for creating a data classification policy
Before deploying and implementing a data loss prevention product, enterprises should have an effective data classification policy in place. Expert Bill Hayes explains how that can be done. Continue Reading
-
Scour your enterprise with network security monitoring tools
Advanced network security monitoring tools offer new hope for catching malware threats that fly under the traditional radar. Continue Reading
-
The top antimalware protection products for endpoint security
Antimalware protection is essential for securing client computers and devices. Here's a look at the top endpoint protection products in the industry. Continue Reading
-
What features do you need in an EMM tool?
Enterprise mobility management products evolved from different types of mobility management tools, and so can vary greatly. Review capabilities and features you’ll want to consider before you buy. Continue Reading
-
How to keep track of sensitive data with a data flow map
Expert Bill Hayes describes how to create a data flow map to visualize where sensitive data is processed, how it transits the network and where it's stored. Continue Reading
-
Six criteria for buying data loss prevention products
Expert Bill Hayes lays out six steps to take in order to buy the right data loss protection (DLP) products for your organization. Continue Reading
-
Four enterprise scenarios for deploying database security tools
Expert Adrian Lane describes the use cases and ways database security tools are used to boost enterprise security. Continue Reading
-
Introduction to database security tools for the enterprise
Expert Adrian Lane explains why database security tools play a significant, if not the majority, role in protecting data in the enterprise data center. Continue Reading
-
Three usage scenarios for deploying data loss prevention products
Expert Bill Hayes details usage scenarios for deploying data loss prevention: standalone suites, integrated tools and standalone/integrated DLP combined. Continue Reading
-
The business case for data loss prevention products
Data loss prevention (DLP) can help any organization where the loss of sensitive information could seriously impact continued operation, explains Bill Hayes. Continue Reading
-
Introduction to data loss prevention products
Expert Bill Hayes describes how data loss prevention (DLP) products can help identify and plug information leaks and improve enterprise security. Continue Reading