All Posts (2637)

Sort by

EDR Top Vendors

Frequently Compared EDR Products

Check Point Vs. Palo Alto
FireEye Vs. Symantec
Tripwire Vs. Trend Micro
Bromium Vs. CrowdStrike
CyberBit Vs. Panda Security
Symantec Vs. Cisco

Are You Comparing Products Correctly?

Compare EDR Vendors across feature

Read more…
Views: 358
Comments: 0

WAF Top Vendors

Frequently Compared WAF Products

Cloudfare Vs. Penta Security
Imperva Vs. Trustwave
Radware Vs. Denyall
f5 Networks Vs. Fortinet
Akamai Vs. Citrix
Cloudfare Vs. Fortinet

Are you comparing the products correctly?

 Compare all WAF vendors across featu

Read more…
Views: 523
Comments: 0

RASP Competitors

Frequently Compared RASP Products

HPE Vs. Immunio
IBM Vs. Veracode
Immunio Vs. Prevoty
Contrast Security Vs. HPE
Prevoty Vs. Veracode
IBM Vs. Contrast Security
Are you comparing the products correctly?

Compare all RASP vendors across features like

Read more…
Views: 250
Comments: 0

Discover Vendors of Threat Intelligence

Frequently Compared Threat Intelligence Products

Area1 Vs. Vectra
BugThreats Vs. Zerofox TI
Anomali Vs. Falcon-Intelligence
DeepSight Intelligence Vs. ThreatSmart
Zerofox TI Vs. Anomali
BugThreats Vs. Vectra
Are You Comparing Products Correctly?

Co

Read more…
Views: 66
Comments: 0

IAM Competitors

Frequently Compared IAM Products

IdentityIQ Vs. RSA via Access
SAP Vs. CA Technologies
Omada Vs. Courion
Dell Vs. Evidian
CA Technologies Vs. IdentityIQ
Hitachi Vs. Entrust
Are you comparing the products correctly?
Compare all IAM vendors across fe
Read more…
Views: 520
Comments: 0

EMM Top Vendors

Frequently Compared EMM Products

Sophos Vs. Microsoft
SAP Vs. Soti
Sophos Vs. Citrix
MobileIron Vs. IBM
VMware Vs. Blackberry
Microsoft Vs. Landesk
Are you comparing the products correctly?
Compare all EMM vendors across features like device divers
Read more…
Views: 192
Comments: 0

Compare NGFW security vendors

Frequently Compared Vulnerability Assessment Tools

Cisco Vs. Fortinet
CheckPoint Vs. Juniper
Watchguard Vs. Barracuda
Forcepoint Vs. Cisco
Qosmos Vs. Fortinet
Juniper Vs. Watchguard
Are You Comparing Products Correctly?
Get a comparison of next-gen
Read more…
Views: 598
Comments: 0

Compare Vendors of Threat Intelligence

Frequently Compared Threat Intelligence Products

Area1 Vs. Vectra
BugThreats Vs. Zerofox TI
Anomali Vs. Falcon-Intelligence
DeepSight Intelligence Vs. ThreatSmart
Zerofox TI Vs. Anomali
BugThreats Vs. Vectra
Are You Comparing Products Correctly?
Read more…
Views: 72
Comments: 0

Compare Vendors of Threat Intelligence

Frequently Compared Threat Intelligence Products

Area1 Vs. Vectra
BugThreats Vs. Zerofox TI
Anomali Vs. Falcon-Intelligence
DeepSight Intelligence Vs. ThreatSmart
Zerofox TI Vs. Anomali
BugThreats Vs. Vectra
Are You Comparing Products Correctly?
Read more…
Views: 246
Comments: 0

Compare Vendors of Threat Intelligence

Frequently Compared Threat Intelligence Products

Area1 Vs. Vectra
BugThreats Vs. Zerofox TI
Anomali Vs. Falcon-Intelligence
DeepSight Intelligence Vs. ThreatSmart
Zerofox TI Vs. Anomali
BugThreats Vs. Vectra
Are You Comparing Products Correctly?
Read more…
Views: 422
Comments: 0

Vulnerability Assessment Tools Comparison

Frequently Compared Vulnerability Assessment Tools

Nessus Vs. Qualys
SaintScanner Vs. Nexpose 
McAfee Vs. FusionVM
AVDS Vs. Nessus
FusionVM Vs. RetinaNetwork
QualysVs. SaintScanner
Are You Comparing Products Correctly?
Perform a comparison of 10+
Read more…
Views: 756
Comments: 0

Vulnerability Assessment Tools Comparison

Frequently Compared Vulnerability Assessment Tools

Nessus Vs. Qualys
SaintScanner Vs. Nexpose 
McAfee Vs. FusionVM
AVDS Vs. Nessus
FusionVM Vs. RetinaNetwork
QualysVs. SaintScanner
Are You Comparing Products Correctly?
Perform a comparison of 10
Read more…
Views: 492
Comments: 0

How To Measure Your Cyber Security Program ?

Web Applications are the front door of enterprises and apps are one of the top attack vectors for the attackers today. The cost of a breach, the downtime, the loss of reputation are not just the CISO’s concern but very much the concern of the board l

Read more…
Views: 56
Comments: 0

How To Measure Your Cyber Security Program ?

Web Applications are the front door of enterprises and apps are one of the top attack vectors for the attackers today. The cost of a breach, the downtime, the loss of reputation are not just the CISO’s concern but very much the concern of the board l

Read more…
Views: 93
Comments: 0

How To Measure Your Cyber Security Program ?

Web Applications are the front door of enterprises and apps are one of the top attack vectors for the attackers today. The cost of a breach, the downtime, the loss of reputation are not just the CISO’s concern but very much the concern of the board l

Read more…
Views: 99
Comments: 0

Next Generation Firewall Security

The firewall in simple terms acts as a barrier to prevent unauthorized access or malicious traffic within a system or in a network. With the rapid growth of new innovative technology and alongside with the massive growth of new security threats, the

Read more…
Views: 91
Comments: 0

5 TOP Vulnerability Assessment Tools

Vulnerability assessment tools detect vulnerabilities in applications using many ways. It analyses coding bugs. Finds well known rootkits, backdoors and trojans. 

There are many tools available in the market. Here are our top picks :

 1. Nikto2 - Nik

Read more…
Views: 205
Comments: 0

TOP GRC Vendors

IT-GRC solutions allow organizations to effectively manage IT and Security risks while reducing the cost and complexity of compliance. IT and Security GRC management solution are focused on leveraging near-real-time information on IT and Security ass

Read more…
Views: 233
Comments: 0

Join The Community Discussion

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)
 

 

 

CISO Platform Talks : Security FireSide Chat With A Top CISO or equivalent (Monthly)

  • Description:

    CISO Platform Talks: Security Fireside Chat With a Top CISO

    Join us for the CISOPlatform Fireside Chat, a power-packed 30-minute virtual conversation where we bring together some of the brightest minds in cybersecurity to share strategic insights, real-world experiences, and emerging trends. This exclusive monthly session is designed for senior cybersecurity leaders looking to stay ahead in an ever-evolving landscape.

    We’ve had the privilege of…

  • Created by: Biswajit Banerjee
  • Tags: ciso, fireside chat

6 City Round Table On "New Guidelines & CISO Priorities for 2025" (Delhi, Mumbai, Bangalore, Pune, Chennai, Kolkata)

  • Description:

    We are pleased to invite you to an exclusive roundtable series hosted by CISO Platform in partnership with FireCompass. The roundtable will focus on "New Guidelines & CISO Priorities for 2025"

    Date: December 1st - December 31st 2025

    Venue: Delhi, Mumbai, Bangalore, Pune, Chennai, Kolkata

    >> Register Here

  • Created by: Biswajit Banerjee

Fireside Chat With Sandro Bucchianeri (Group Chief Security Officer at National Australia Bank Ltd.)

  • Description:

    We’re excited to bring you an insightful fireside chat with Sandro Bucchianeri (Group Chief Security Officer at National Australia Bank Ltd.) and Erik Laird (Vice President - North America, FireCompass). 

    About Sandro:

    Sandro Bucchianeri is an award-winning global cybersecurity leader with over 25…

  • Created by: Biswajit Banerjee
  • Tags: ciso, sandro bucchianeri, nab