Security Software

Security | News, how-tos, features, reviews, and videos

3D Laptop with shield, Cyber Security concept.
Online security concept. Businessman touching lock icon to access data. authentication

A download now button with the front page of Peerspot’s paper ‘Advanced Threat Protection’

ATP (Advanced Threat Protection): Which solution is best?

PeerSpot users review the highest rated solutions in the ATP (Advanced Threat Protection) market

Businessman holding a shield with a padlock, threat protection concept

Threat Intelligence Platforms: Which solution is best?

PeerSpot users review the highest rated solutions in the threat intelligence platform market

Security expert is pushing INTRUSION DETECTION on a touch screen interface.

Intrusion Detection and Prevention Software (IDPS): Which solution is best?

PeerSpot users review the highest rated solutions in the intrusion detection and prevention software (IDPS) market

Purple neon icon of web content filtering against a dark background

Web Content Filtering: Which solution is best?

PeerSpot users review the highest rated solutions in the web content filtering market

Workers working on computer that says Password and has a lock icon

Enterprise Password Managers: Which solution is best?

Peerspot users review the highest rated solutions in the enterprise password manager market.

Businessman walking on twisted rope high in sky

Removing security complexity to combat cyber threats

Businesses are struggling with an overwhelming, and increasingly complex and confusing cyber world. Ian McShane, Field CTO at Arctic Wolf looks at how cyber simplicity is the key for businesses to move forward with their security...

A businessman reaching out to touch a user type login, and password

Auth0 vs Azure Active Directory (Azure AD): Which Single Sign-On (SSO) solution is better?

Peerspot users evaluate two of the highest reviewed solutions in the Single Sign-On (SSO) market – Auth0 and Azure Active Directory (Azure AD).

Businessman on mobile phone logging in to secure account

Single Sign-On (SSO): Which solution is best?

Peerspot users review the highest reviewed solutions in the single sign-on market.

Data protection blocks

Building continuous data protection against ransomware attacks

The largest ransomware attack in history - WannaCry - tore across the globe in 2017, infecting a quarter million machines in more than 150 countries. Since then a lot has changed in the world of ransomware, but have we learnt anything?...

Futuristic design of human eye for cyber security, system diagnostic

Human vigilance vital in tackling enterprise vulnerability

Sophos Senior Vice President Asia Pacific Japan Gavin Struthers discusses regional ransomware trends and the need for heightened global vigilance.

IDGConnect_cyber_prevention_mitigation_security_shutterstock_2005877624_1200x800

Cyber prevention or mitigation… Why can’t it be both?

The technology market today is being flooded with security solutions from across the globe that claim to be unique and practically unbeatable. But when it comes to defence, do you prioritise attack prevention or damage mitigation?

IDGConnect_peerspot_security_automation_SOAR_shutterstock_1931787956_1200x700

Security orchestration, automation and response (SOAR): Which solution is best?

Peerspot users review the highest reviewed solutions in the security orchestration, automation and response (SOAR) market.

IDGConnect_cyberthreat_threat_cyber_security_shutterstock_285058184_1200x800

A look ahead to 2022: predicting the top cyber threats

Looking ahead to 2022, Raj Samani, McAfee Fellow and Chief Scientist at McAfee Enterprise examine the top 2022 cybersecurity threats, including an increase in various types of nation state attacks, as well as a shift in the...

IDGConnect_endpointprotection_ITcentral_shutterstock_694483051_1200x800

Endpoint Protection for Business (EPP): Which solution is best?

IT Central Station users review the highest reviewed solutions in the endpoint protection for business (EPP) market.

IDGConnect_unifiedthreatmanagement_ITcentral_shutterstock_1918593848_1200x800

Unified threat management (UTM): Which solution is best?

IT Central Station users review the highest reviewed solutions in the unified threat management (UTM) market.

IDGConnect_SIEM_itcentral_shutterstock_1949097475_1200x800

Security Information and Event Management (SIEM): Which solution is best?

IT Central Station users review the highest reviewed solutions in the security information and event management (SIEM) market.

IDGConnect_conversation_security_cybersecurity_shutterstock_1798108960_1200x800

Beginning a more mature conversation about cybersecurity

No system is invulnerable to breaches. So how can businesses withstand any storm and thrive regardless of a threatening landscape? Creating institutional cyber-resilience is ultimately more important than any other measure a company...

IDGConnect_applicationsecurity_security_shutterstock_184658570_1200x800

Sonatype Nexus Lifecycle and WhiteSource: Which application security solution is better?

IT Central Station users review two of the highest reviewed solutions in the application security market – Sonatype Nexus Lifecycle and WhiteSource.

Load More