Products

The top cybersecurity products, chosen by our expert staff based on our in-depth analysis of the market for security tools.

  • Cybereason Total Enterprise Protection: EDR Product Overview and Insight

    See the complete list of top 10 Endpoint Detection and Response solutions. Company description: Cybereason bills itself as the leader in endpoint protection. The company applies a military perspective to cyber security Founded by Israeli cyber intelligence professionals in 2012, it is privately held and headquartered in Boston, with offices in London, Tel Aviv and…


  • RSA NetWitness Endpoint: EDR Product Overview and Insight

    See the complete list of top 10 Endpoint Detection and Response solutions. Company description: RSA provides more than 30,000 customers worldwide with security tools that protect assets from cyber threats. The company was acquired by EMC a few years ago and is now part of Dell EMC, which is privately held. Product description: RSA NetWitness…


  • CounterTack Endpoint Threat: EDR Product Overview and Insight

    See the complete list of top 10 Endpoint Detection and Response solutions. Company description: CounterTack is a private EDR startup that has more than 250 customers globally. It recently raised $20 million in Series D funding, which came from Singtel Innov8 (venture capital arm of The Singtel Group), along with SAP National Security Services (SAP…


  • Carbon Black Cb Response: EDR Product Overview and Insight

      Company description: Carbon Black was founded by former members of the U.S. government’s team of offensive security hackers. Trained by the NSA and CIA, its founders developed tools and techniques for endpoint security to protect against cyberattacks. It has been delivering cybersecurity products and solutions for more than 12 years. Its more than 3,000…


  • Symantec Endpoint Protection: EDR Product Overview and Insight

    See the complete list of top 10 Endpoint Detection and Response solutions. Company description: Founded in 1982, Symantec has more than 11,000 employees in 35 countries. Product description: Symantec Endpoint Protection 14 (SEP) is said to stop 99.9% of advanced threats. The company’s EDR add-on augments that with incident investigation and response. It uncovers breaches…


  • Tanium: EDR Product Overview and Insight

    See the complete list of top 10 Endpoint Detection and Response solutions. Company description: Founded in 2007, Tanium views itself as the central nervous system of enterprises. Total funding to date is $407 million. Product description: Tanium’s endpoint communications architecture offers a suite of tools for detection and response that include threat detection, investigation, remediation,…


  • Guidance Software EnCase Endpoint Security: EDR Product Overview and Insight

    See the complete list of top 10 Endpoint Detection and Response solutions. Company description: Guidance software was founded in 1997 and went public in 2007. It trades on the NASDAQ under GUID. Product description: EnCase Endpoint Security provides kernel-level visibility at the endpoint for detection and response. It enables early detection of signs of intrusion,…


  • Cisco AMP for Endpoints Features & Pricing

    See the complete list of top 10 Endpoint Detection and Response solutions. Company description: Cisco began as a networking pioneer more than 30 years ago, then became a major player in storage before moving into other areas of IT including security. It trades on NASDAQ as CSCO. Product description: Cisco AMP (Advanced Malware Protection) for…


  • FireEye Endpoint Features & Pricing

    See the complete list of top 10 Endpoint Detection and Response solutions. Company description: FireEye bills itself as the intelligence-led security company. It offers a single platform that blends security technologies, threat intelligence, and consulting. It has more than 5,800 customers across 67 countries, including more than 40 percent of the Forbes Global 2000. FireEye…


  • How to Prevent Password Encryption Exploits

    When warning about the risks of website attacks like SQL injection and remote file inclusion, we often talk about how these breaches can reveal “sensitive data.” What kind of sensitive data? Well, lots of kinds, such as personal data about account holders or privileged information like internal business documents. But the kind of sensitive data…


Top Cybersecurity Companies

Get the Free Newsletter!

Subscribe to Cybersecurity Insider for top news, trends & analysis