• CONTACT US
  • Create Free Account
  • Login
NSS Labs
  • About
    • History
    • Types of Reports
  • Technologies Covered
  • Library Access
Select Page

Jason Pappalexis

A Path Through the Forest: NSS Releasing Product Selection Guide for Breach Detection Systems

by Jason Pappalexis | Aug 18, 2016 | Blog

Choosing a security product is challenging no matter the technology or industry vertical. Many factors come into play, including price, security effectiveness, performance, management, workflow, deployment architecture, and interoperability. It can easily take months...
Breach Detection Systems Are Growing Up

Breach Detection Systems Are Growing Up

by Jason Pappalexis | Aug 10, 2016 | Blog

Organizations understand the value of keeping an in-house malware research team “plugged in” and ready to analyze files at any time, and this emphasizes the value of the breach detection system (BDS).A brushed steel, open lock with a background of code Breach...

Juniper Backdoor

by Jason Pappalexis | Dec 21, 2015 | Blog

UPDATE: As of December 23rd, we have learned that even when the usernames are changed on an unpatched Juniper product, the device can still be compromised. Therefore, it is urgent that Juniper customers patch their devices immediately. On December 17, Juniper Networks...

NSS Releases In-Depth Analyses of Evolving SWG Market

by Jason Pappalexis | Dec 17, 2015 | Blog

The secure web gateway (SWG) product has been a mainstay of security best practices for the past 20 years. The rise of the web as a business and educational resource initially made these products mandatory tools for compliance, and their security use case was soon...

Detecting the Invisible Part 3: “Retreat from the Breach”

by Jason Pappalexis | Mar 5, 2015 | Blog

OUR APPROACH TO SECURING THE ENTERPRISE HAS CHANGED, AND BREACH DETECTION TECHNOLOGY HAS BEEN LARGELY INSTRUMENTAL IN THIS PROCESS. THIS REPORT FROM NSS LABS IS THE FINAL IN A THREE-PART SERIES ON THE IMPACT OF THE BREACH DETECTION SYSTEM (BDS).   As the breach...

Detecting the Invisible Part 2: “Once More Unto the Breach, Dear Friends”

by Jason Pappalexis | Mar 4, 2015 | Blog

OUR APPROACH TO SECURING THE ENTERPRISE HAS CHANGED, AND BREACH DETECTION TECHNOLOGY HAS BEEN LARGELY INSTRUMENTAL IN THIS PROCESS. THIS REPORT FROM NSS LABS IS THE SECOND IN A THREE-PART SERIES ON THE IMPACT OF THE BREACH DETECTION SYSTEM (BDS). The importance of...

Detecting the Invisible

by Jason Pappalexis | Mar 2, 2015 | Blog

OUR APPROACH TO SECURING THE ENTERPRISE HAS CHANGED, AND BREACH DETECTION TECHNOLOGY HAS BEEN LARGELY INSTRUMENTAL IN THIS PROCESS. THIS REPORT FROM NSS LABS IS THE FIRST IN A THREE-PART SERIES ON THE IMPACT OF THE BREACH DETECTION SYSTEM (BDS). One of the newest...

Having your Virtual Cake and Eating it Too

by Jason Pappalexis | Nov 18, 2014 | Blog

Today’s continuously evolving threat landscape and the need for business continuity mandate the need to rethink security workflows. Robust virtual data centers and considerable computing power are the ingredients for a new approach to securing critical data. With an...

It’s Time to Expect More from Your Research

by Jason Pappalexis | Jul 23, 2014 | Blog

As any enterprise research manager or IT buyer will attest, finding the right information – and at the right time – is difficult at best. Oftentimes, multiple sources are used to answer one particular question – and then additional tools must still be used to validate...

Don’t Use a Screwdriver to Do a Hammer’s Job

by Jason Pappalexis | Jun 10, 2014 | Blog

We have to get smart about how we perform security: sophisticated threats require sophisticated countermeasures. The premise sounds simple enough, but the security market is being turned on its head as the effectiveness of legacy technologies such as antivirus is...

Interop 2014: Like sitting next to your great aunt at dinner – interesting, but a bit dry

by Jason Pappalexis | Apr 16, 2014 | Blog

Interop is promoted as a technology conference and traditionally has covered a range of interoperability topics, from core infrastructure up to applications. The conference also provides attendees with information on current security trends. This year, keynotes spoke...

The Noise from Incident Response can Hurt More than Your ears

by Jason Pappalexis | Apr 9, 2014 | Blog

Incident response (IR) is a key process designed to provide context, priority, and ultimately, closure for the events associated with an attack. When enterprise defenses falter, an IR process should give the information security (IS) team enough information to...
Next Entries »

RECENT POSTS

  • NSS Labs Announces New Web Browser Security Test Results July 14, 2020
  • New Advanced Endpoint Protection (AEP) Comparative Ratings Report Out Today June 16, 2020
  • NSS Labs Announces New Ratings System Along with Advanced Endpoint Protection Results February 25, 2020
  • NSS Labs Announces 2019 Data Center Firewall / Security Gateway Group Test Results November 12, 2019
  • NGIPS 5.0 ERRATA – PALO ALTO Networks October 8, 2019
CyberRatings.org

2303 Ranch Road 620 South
Suite 160, #501
Austin, TX 78734

Phone: +1(512)333-1734
Fax: +1(512)727-2130

Contact
info@cyberratings.org press@cyberratings.org
Twitter Linkedin
Legal

Terms of Service
Privacy Policy
Cookie Policy
Copyright and Quote Policy

©2022 CyberRatings.org