All Posts (2678)

Sort by

EDR Top Vendors

Frequently Compared EDR Products

Check Point Vs. Palo Alto
FireEye Vs. Symantec
Tripwire Vs. Trend Micro
Bromium Vs. CrowdStrike
CyberBit Vs. Panda Security
Symantec Vs. Cisco

Are You Comparing Products Correctly?

Compare EDR Vendors across feature

Read more…
Views: 403
Comments: 0

EDR Top Vendors

Frequently Compared EDR Products

Check Point Vs. Palo Alto
FireEye Vs. Symantec
Tripwire Vs. Trend Micro
Bromium Vs. CrowdStrike
CyberBit Vs. Panda Security
Symantec Vs. Cisco

Are You Comparing Products Correctly?

Compare EDR Vendors across feature

Read more…
Views: 364
Comments: 0

WAF Top Vendors

Frequently Compared WAF Products

Cloudfare Vs. Penta Security
Imperva Vs. Trustwave
Radware Vs. Denyall
f5 Networks Vs. Fortinet
Akamai Vs. Citrix
Cloudfare Vs. Fortinet

Are you comparing the products correctly?

 Compare all WAF vendors across featu

Read more…
Views: 528
Comments: 0

RASP Competitors

Frequently Compared RASP Products

HPE Vs. Immunio
IBM Vs. Veracode
Immunio Vs. Prevoty
Contrast Security Vs. HPE
Prevoty Vs. Veracode
IBM Vs. Contrast Security
Are you comparing the products correctly?

Compare all RASP vendors across features like

Read more…
Views: 278
Comments: 0

Discover Vendors of Threat Intelligence

Frequently Compared Threat Intelligence Products

Area1 Vs. Vectra
BugThreats Vs. Zerofox TI
Anomali Vs. Falcon-Intelligence
DeepSight Intelligence Vs. ThreatSmart
Zerofox TI Vs. Anomali
BugThreats Vs. Vectra
Are You Comparing Products Correctly?

Co

Read more…
Views: 68
Comments: 0

IAM Competitors

Frequently Compared IAM Products

IdentityIQ Vs. RSA via Access
SAP Vs. CA Technologies
Omada Vs. Courion
Dell Vs. Evidian
CA Technologies Vs. IdentityIQ
Hitachi Vs. Entrust
Are you comparing the products correctly?
Compare all IAM vendors across fe
Read more…
Views: 530
Comments: 0

EMM Top Vendors

Frequently Compared EMM Products

Sophos Vs. Microsoft
SAP Vs. Soti
Sophos Vs. Citrix
MobileIron Vs. IBM
VMware Vs. Blackberry
Microsoft Vs. Landesk
Are you comparing the products correctly?
Compare all EMM vendors across features like device divers
Read more…
Views: 200
Comments: 0

Compare NGFW security vendors

Frequently Compared Vulnerability Assessment Tools

Cisco Vs. Fortinet
CheckPoint Vs. Juniper
Watchguard Vs. Barracuda
Forcepoint Vs. Cisco
Qosmos Vs. Fortinet
Juniper Vs. Watchguard
Are You Comparing Products Correctly?
Get a comparison of next-gen
Read more…
Views: 602
Comments: 0

Compare Vendors of Threat Intelligence

Frequently Compared Threat Intelligence Products

Area1 Vs. Vectra
BugThreats Vs. Zerofox TI
Anomali Vs. Falcon-Intelligence
DeepSight Intelligence Vs. ThreatSmart
Zerofox TI Vs. Anomali
BugThreats Vs. Vectra
Are You Comparing Products Correctly?
Read more…
Views: 78
Comments: 0

Compare Vendors of Threat Intelligence

Frequently Compared Threat Intelligence Products

Area1 Vs. Vectra
BugThreats Vs. Zerofox TI
Anomali Vs. Falcon-Intelligence
DeepSight Intelligence Vs. ThreatSmart
Zerofox TI Vs. Anomali
BugThreats Vs. Vectra
Are You Comparing Products Correctly?
Read more…
Views: 253
Comments: 0

Compare Vendors of Threat Intelligence

Frequently Compared Threat Intelligence Products

Area1 Vs. Vectra
BugThreats Vs. Zerofox TI
Anomali Vs. Falcon-Intelligence
DeepSight Intelligence Vs. ThreatSmart
Zerofox TI Vs. Anomali
BugThreats Vs. Vectra
Are You Comparing Products Correctly?
Read more…
Views: 429
Comments: 0

Vulnerability Assessment Tools Comparison

Frequently Compared Vulnerability Assessment Tools

Nessus Vs. Qualys
SaintScanner Vs. Nexpose 
McAfee Vs. FusionVM
AVDS Vs. Nessus
FusionVM Vs. RetinaNetwork
QualysVs. SaintScanner
Are You Comparing Products Correctly?
Perform a comparison of 10+
Read more…
Views: 763
Comments: 0

Vulnerability Assessment Tools Comparison

Frequently Compared Vulnerability Assessment Tools

Nessus Vs. Qualys
SaintScanner Vs. Nexpose 
McAfee Vs. FusionVM
AVDS Vs. Nessus
FusionVM Vs. RetinaNetwork
QualysVs. SaintScanner
Are You Comparing Products Correctly?
Perform a comparison of 10
Read more…
Views: 497
Comments: 0

How To Measure Your Cyber Security Program ?

Web Applications are the front door of enterprises and apps are one of the top attack vectors for the attackers today. The cost of a breach, the downtime, the loss of reputation are not just the CISO’s concern but very much the concern of the board l

Read more…
Views: 57
Comments: 0

How To Measure Your Cyber Security Program ?

Web Applications are the front door of enterprises and apps are one of the top attack vectors for the attackers today. The cost of a breach, the downtime, the loss of reputation are not just the CISO’s concern but very much the concern of the board l

Read more…
Views: 96
Comments: 0

How To Measure Your Cyber Security Program ?

Web Applications are the front door of enterprises and apps are one of the top attack vectors for the attackers today. The cost of a breach, the downtime, the loss of reputation are not just the CISO’s concern but very much the concern of the board l

Read more…
Views: 101
Comments: 0

Next Generation Firewall Security

The firewall in simple terms acts as a barrier to prevent unauthorized access or malicious traffic within a system or in a network. With the rapid growth of new innovative technology and alongside with the massive growth of new security threats, the

Read more…
Views: 93
Comments: 0

5 TOP Vulnerability Assessment Tools

Vulnerability assessment tools detect vulnerabilities in applications using many ways. It analyses coding bugs. Finds well known rootkits, backdoors and trojans. 

There are many tools available in the market. Here are our top picks :

 1. Nikto2 - Nik

Read more…
Views: 225
Comments: 0

Join The Community Discussion

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)
 

 

 

Atlanta Chapter Meet: Build the Pen Test Maturity Model (Virtual Session)

  • Description:

    The Atlanta Pen Test Chapter has officially begun and is now actively underway.

    Atlanta CISOs and security teams have kicked off Pen Test Chapter #1 (Virtual), an ongoing working series focused on drafting Pen Test Maturity Model v0.1, designed for an intel-led, exploit-validated, and AI-assisted security reality. The chapter was announced at …

  • Created by: Biswajit Banerjee
  • Tags: ciso, pen testing, red team, security leadership