We have reviewed quite a few threat hunting programs recently. However, almost all of them were designed as tools to help threat hunters do their jobs. But there are few good hunters. Mantix4, originally designed for the Canadian Government, now provides threat hunting as a service.
Among its many benefits, the Toshiba Portégé X20W Notebook features dual-factor authentication in the form of a fingerprint reader and facial recognition technology, making it ideal for the security-minded road warrior.
Perfect for educational environments, the core of the Sprout is an all-in-one computer with a fast, Intel Core i7 processor, plenty of RAM, a high-end Nvidia GeForce video card and a terabyte- sized solid-state hard drive. Standard peripherals like a mouse and keyboard are included, but probably not needed.
The Web Application Firewall from Barracuda Networks does an excellent job of covering the entire cybersecurity waterfront, or at least the parts that administrators feel need the most protection. It’s so robust, you probably shouldn’t think of it as just a firewall.
Micro segmentation is one of the most advanced security methods that organizations can employ to protect critical assets, users, and data from both outside hackers and malicious insiders. But it has to be done right. Find out if GuardiCore Centra is up to the challenge.
Using a threat hunting platform like Sqrrl may take a little bit of a shift in thinking for cybersecurity teams. It’s less like being a beat cop and more like being a consulting detective, but arguably much more effective at catching the really dangerous, hidden threats before they can strike.
The Waratek Application Security Platform relies on just-in-time compiling and focuses exclusively on one of the biggest security risks within most organizations: applications running Java. Find out how the new technology worked in CSO magazine.
It’s clear that BlackBerry is attempting to recapture some of it’s past glory with the KEYone, while also addressing their historical shortcomings. I was able to spend some time evaluating it for government suitability.
SecBI has fielded new software that aims to eliminate the burden of processing billions of traffic logs per month manually, and they did it without using any network taps. Come to CSO Magazine to find out how SecBI solved this tricky problem in an exclusive review of the new product.
CSO Magazine is turning up the heat on cybersecurity, diving into reviews of the latest cyber defenses in critical categories as part of a summer reviews blitz. Find out how the latest products in deception, microsegmentation, network traffic analysis and others stack up.