ESG Validation

ESG Technical Review: DivvyCloud Cloud and Container Security

Abstract

This ESG Technical Review of DivvyCloud cloud and container security focuses on how DivvyCloud can enable a friction-free strategy for customers to embrace the cloud in their business operations. ESG explored DivvyCloud’s extensible, multi-cloud, software-defined security and governance platform, and how DivvyCloud enables enhanced agility, decreases time to value, and provides automated security for cloud- and container-hosted workloads.

Topics: Cybersecurity Cloud Services & Orchestration

ESG Technical Validation: Efficient Efficacy with Morphisec Unified Threat Prevention Platform

Introduction

This ESG Technical Validation documents evaluation of Morphisec’s moving target defense-powered Unified Threat Prevention Platform. We focused on understanding the operational simplicity of the platform and the efficacy of its threat prevention capabilities.

Topics: Cybersecurity

ESG Technical Review: Verifying Network Intent with Forward Enterprise

Abstract

This ESG Technical Review documents hands-on validation of Forward Enterprise, a solution developed by Forward Networks to help organizations save time and resources when verifying that their IT networks can deliver application traffic consistently in line with network and security policies. The review examines how Forward Enterprise can reduce network downtime, ensure compliance with policies, and minimize adverse impact of configuration changes on network behavior.

Topics: Cybersecurity Networking

ESG Technical Validation First Look: Efficient Efficacy with Morphisec Advanced Threat Prevention Platform

Cybersecurity Challenges

The ever-increasing volume and velocity of threats has made cybersecurity one of the top IT concerns. However, IT’s drive to improve the business’ security posture is complicated by the global cybersecurity skills shortage. As a result, organizations evaluating their options for strengthening cybersecurity are seeking more efficient and effective tools. Indeed, according to ESG research, 46% of surveyed IT and cybersecurity decision makers ranked effectiveness as the most important consideration when investing in cybersecurity products or services—by far the most often cited consideration.2

Topics: Cybersecurity

ESG Technical Review: Comodo MDR: Security Operations Center-as-a-service

Co-Author(s): Jack Poller


Abstract

This ESG Technical Review documents hands-on testing of the Comodo MDR security operations center (SOC)-as-a-service platform. We focus on how Comodo MDR provides defense-in-depth for organizations’ network, endpoints, web, and cloud infrastructure as a bundled, cost-efficient service.

Topics: Cybersecurity Cloud Services & Orchestration

ESG Lab Review: ThreatConnect TC Analyze Threat Intelligence Platform

Co-Author(s): Tony Palmer


Abstract

This ESG Lab Review documents hands-on testing of ThreatConnect TC Analyze to verify its ability to reduce an organization’s mean time to respond to security incidents and threats. We focused on how TC Analyze can help security operations center (SOC) and incident response (IR) analysts to enrich threat data and create intelligence about identified threats, import files or emails to extract potential threats, manage action items related to specific threats and incidents, and create customized dashboards.

Topics: Cybersecurity

ESG Lab Review: ThreatConnect TC Identify Delivers Threat Intelligence

Co-Author(s): Dom Amato


Abstract

This ESG Lab Review documents hands-on testing of ThreatConnect TC Identify and evaluates its ability to accelerate and simplify threat detection. ESG Lab focused on how TC Identify provides IT managers with the tools to configure threat intelligence from more than 100 open source data feeds and premium feeds that the organization subscribes to, summarize and score potential threats with insights from the ThreatConnect Research Team, and optimize data dissection by integrating with other tools such as a SIEM or firewall.

Topics: Cybersecurity

ESG Technical Review: Managing Risk, Complexity, and Cost with SanerNow Endpoint Security and Management Platform

The Challenges

As organizations of all sizes embrace digital transformation and the shift to modern cloud architectures, their IT infrastructure is both growing and becoming more complex. Indeed, two-thirds (68%) of respondents to an ESG research survey said that their IT environment had become more complex in the last two years.1

Complex infrastructures have large attack surface areas, necessitating a variety of cybersecurity tools and techniques to protect them against ever-increasing volumes and sophistication of attacks. However, cybersecurity teams report numerous challenges managing an assortment of security products from different vendors, such as the inefficiencies created by having separate management and operations for each tool, cited by 27% of ESG research respondents as a challenge, or different tools for various parts of the IT infrastructure (24%), or the number of security tools making operations complex and time consuming (22%)

Topics: Cybersecurity

ESG Lab Validation: McAfee Enterprise Security Manager

Co-Author(s): Alex Arcilla


Introduction

This ESG Lab Validation report documents hands-on testing of the McAfee next-generation SIEM solution. ESG Lab focused on the McAfee Enterprise Security Manager (ESM), the core product of McAfee’s end-to-end solution for addressing comprehensive threat detection and remediation. Testing was designed to explore how the solution accurately detects advanced threats using a layered approach, the speed and effectiveness of responding to an attack, and the operational efficiencies of this integrated solution.

Topics: Cybersecurity

ESG Lab Review: ForeScout Extended Module for IBM BigFix

Abstract

This report provides a first look at the key benefits of integrating ForeScout CounterACT with IBM BigFix endpoint management and security solution. ESG Lab focused on how the ForeScout Extended Modules can combine ForeScout’s endpoint insight, classification, and control capabilities with IBM BigFix. This integration is designed to discover and classify users and devices, verify the presence and operation of BigFix Agents, enforce compliance, and take automated host or network actions when needed.

Topics: Cybersecurity