
John Breeden II
John Breeden II is an award-winning journalist and reviewer with over 20 years of experience covering technology. He is the CEO of the Tech Writers Bureau, a group that creates technological thought leadership content for organizations of all sizes.

Review: SaltStack brings SecOps to network orchestration and automation
SaltStack Enterprise, and its optional SecOps modules, is one of the only platforms available today that can fully manage complex enterprise environments while also protecting them.

Review: Blue Hexagon may make you rethink perimeter security
This fully functional, fully trained cybersecurity tool is ready on day 1 to spot threats on whatever network it’s charged with protecting.

Fight firewall sprawl with AlgoSec, Tufin, Skybox suites
These three security policy management toolsets deliver orchestration and automation.

Review: vArmour flips security on its head
Instead of focusing on the bad guys, vArmour identifies good processes and locks them down.

Review: Threat hunting turns the tables on attackers
For this review, we tested threat hunting systems from Sqrrl, Endgame and Infocyte. Each program was tested in a large demo environment seeded with realistic APT threats which had bypassed perimeter defenses and were hiding somewhere...

Beat the bad guys at their own game with SafeBreach’s simulated cyberattacks
We reviewed SafeBreach with a test network of thousands of virtual clients. There were data servers and clients, with systems configured for business groups like customer service and accounting.

Review: Top tools for preventing data leaks
Most security tools are focused on keeping external attackers at bay. But what about the sensitive data that lives inside your network? How do you make sure it doesn’t get out, either intentionally or by accident? That’s where Data...

Review: Hot new tools to fight insider threats
An entire industry has sprung up to provide a defense against insider threats. We tested products from Fortscale, Avanan, and PFU Systems, with each one concentrating on a different aspect of the problem.

REVIEW: Cyphort makes advanced threat protection easier than ever
Over the past few months, we’ve reviewed a variety of cutting-edge security tools that combat advanced persistent threats (APTs); everything from threat intelligence to virtual sandboxing to privileged identity management. And while...

Review: Stop insider attacks with these 6 powerful tools
For this review, we looked at BeyondTrust, Lieberman Software, NetIQ, CyberArk, Centrify and Viewfinity. This is still an evolving area, and companies are approach it from different perspectives. For that reason, this is not a...

REVIEW: Threat Intelligence could turn the tide against cybercriminals
We review security products from ThreatConnect, ThreatStream, Soltra, Arbor Networks and iSIGHT Partners
-
Research/Infographic
Sponsored -
Analyst Report
Sponsored -
eBook
Sponsored -
White Paper
-
Video/Webcast
Sponsored