• CONTACT US
  • Create Free Account
  • Login
NSS Labs
  • About
    • History
    • Types of Reports
  • Technologies Covered
  • Library Access
Select Page

With Patents Like These, Who Needs a Product?

by Andrew Braunberg | Jan 31, 2014 | Blog

Lenovo has agreed to acquire Motorola Mobility from Google for USD $2.91 billion. This comes as a bit of a shock because in 2011, Google acquired Motorola Mobility for USD $12.5 billion. It’s not surprising that Google has decided to divest itself of the handset...

VMware Late to the Mobile Dance but No Longer Without a Date

by Andrew Braunberg | Jan 31, 2014 | Blog

VMware is a company with a rich history. Founded in 1998, it has done as much as any firm in promoting and furthering server virtualization and a radical rethinking of enterprise data centers. The company was a pioneer in virtualization and policy-driven automation...

Information Security? “There’s an APP for That”

by Chris Morales | Jan 23, 2014 | Blog

If the marketing hype is true, the world soon will be software defined. Hardware will become the lowest common denominator with no real relationship to the systems and applications (apps) it hosts other than offering processing cycles for the needed task. So, if this...

Apple and Samsung Could Kill The Containerization Market Before it Takes Off

by Andrew Braunberg | Jan 23, 2014 | Blog

It occurred to enterprise information technology (IT) and security teams rather quickly that if they were to be forced to allow employee-owned, consumer-grade mobile devices on their corporate networks, it would be beneficial to have the capability to segregate...

The Chameleon VAR – Adapting to The Changing Security Delivery

by Rob Ayoub | Jan 21, 2014 | Blog

If I told you there was a business model that would sell more of your product, generate monthly recurring revenue, and increase customer loyalty, what would you say? Would I be labeled as crazy? What’s the catch? Value added resellers (VARs) take heed: managed...

NSS Labs Releases New Security Value Map™ and Comparative Analysis Reports for 2013 Intrusion Prevention Systems Group Test

by NSS Labs | Jan 15, 2014 | Press

5 of 10 Intrusion Prevention Systems Tested Received NSS Labs Coveted “Recommended” Status AUSTIN, Texas – January 15, 2014 – NSS Labs today released its 2013 Network Intrusion Prevention Systems (IPS) Security Value Map™ and Comparative Analysis Reports, which...

Don’t look down: FireEye’s billion-dollar acquisition of Mandiant holds promise but also deadly risk

by Ken Baylor | Jan 15, 2014 | Blog

FireEye’s acquisition of Mandiant this month stunned many. Some believed two bottles of Kool-Aid merged, while others see the formation of a potential challenger to established security players. Yet others believe this to be the acquisition of an overpriced toy by a...

Financial Malware: Torstein Sets Sail

by Ken Baylor | Jan 9, 2014 | Blog

Whether you lived near moving water in Medieval Russia, were moored in the Highlands of Scotland, or lived in a huge tower in Ireland, you knew when the Vikings had landed. Within moments, everything you owned had been stolen, killed, or set on fire. Those who...

If Information Security perfects the network perimeter, but no one is inside it, is the enterprise still secure?

by Chris Morales | Jan 7, 2014 | Blog

The problem with next-generation information security technology is that it is predicated on last-generation enterprise architecture. In many instances, the best new security options are no more than minor iterations from existing technology. Even though the...

Recent Posts

  • NSS Labs Announces New Web Browser Security Test Results
  • New Advanced Endpoint Protection (AEP) Comparative Ratings Report Out Today
  • NSS Labs Announces New Ratings System Along with Advanced Endpoint Protection Results
  • NSS Labs Announces 2019 Data Center Firewall / Security Gateway Group Test Results
  • NGIPS 5.0 ERRATA – PALO ALTO Networks

Recent Comments

    Archives

    • July 2020
    • June 2020
    • February 2020
    • November 2019
    • October 2019
    • September 2019
    • August 2019
    • July 2019
    • June 2019
    • May 2019
    • April 2019
    • March 2019
    • January 2019
    • December 2018
    • November 2018
    • October 2018
    • September 2018
    • August 2018
    • July 2018
    • June 2018
    • May 2018
    • April 2018
    • March 2018
    • February 2018
    • January 2018
    • December 2017
    • November 2017
    • October 2017
    • September 2017
    • August 2017
    • July 2017
    • June 2017
    • May 2017
    • April 2017
    • March 2017
    • February 2017
    • January 2017
    • December 2016
    • November 2016
    • October 2016
    • September 2016
    • August 2016
    • July 2016
    • June 2016
    • May 2016
    • March 2016
    • February 2016
    • January 2016
    • December 2015
    • November 2015
    • October 2015
    • September 2015
    • August 2015
    • June 2015
    • May 2015
    • April 2015
    • March 2015
    • February 2015
    • January 2015
    • November 2014
    • October 2014
    • September 2014
    • August 2014
    • July 2014
    • June 2014
    • April 2014
    • March 2014
    • February 2014
    • January 2014
    • December 2013
    • September 2013
    • July 2013
    • June 2013
    • May 2013
    • February 2013
    • January 2013
    • November 2012
    • October 2012
    • September 2012
    • August 2012
    • July 2012
    • February 2012

    Categories

    • Blog
    • Press
    • Videos

    Meta

    • Log in
    • Entries feed
    • Comments feed
    • WordPress.org
    • History
    • Types of Reports
    • Library Access
    CyberRatings.org

    2303 Ranch Road 620 South
    Suite 160, #501
    Austin, TX 78734

    Phone: +1(512)333-1734
    Fax: +1(512)727-2130

    Contact
    info@cyberratings.org press@cyberratings.org
    Twitter Linkedin
    Legal

    Terms of Service
    Privacy Policy
    Cookie Policy
    Copyright and Quote Policy

    ©2022 CyberRatings.org