New Tests in 2020 and 2021
There are many different ways attackers can circumvent security products, a challenge for even the most experienced security pro. That’s why we test. We’ve been testing endpoint and network products for years, using live victim machines to emulate real human interactions. This year, we are adding new technology categories including those designed for the cloud.
Cloud Host & Endpoint Security
A cloud workload is a discrete work function that runs on a cloud instance such as a web server, a database, or a container. Cloud host & endpoint security solutions are focused on securing workloads through a combination of network segmentation, firewalling, traffic visibility, workload behavior monitoring, anti-malware, application control, log management and monitoring. These solutions are typically agent-based, and ideally are able to secure workloads implemented via containers as well as workloads running on virtual infrastructure-as-a-service instances.
Cloud Network Firewall
The firewall market is one of the largest and most mature security technology segments. Firewalls have undergone several stages of development, from early packet filtering and circuit relay firewalls to application layer (proxy-based) and dynamic packet filtering firewalls. Throughout their history, however, the goal has been to enforce an access control policy between two networks, and thus should be viewed as an implementation of policy. As applications migrate to the cloud, enterprises need something to protect cloud networks from the Internet. Cloud firewalls have been developed to do just that.
Network Traffic Analysis
Threat actors’ tactics are constantly evolving to avoid detection and bypass protection offered by security solutions. Network traffic analysis (NTA) products intercept, record, and analyze network traffic communication patterns in order to detect and respond to security threats that would otherwise be invisible.
Secure Access Service Edge
The convergence of cloud computing, omnipresent + ubiquitous high-speed Internet, and tools that enable remote mobile workforces is changing how modern enterprises operate. Secure access service edge (SASE) offerings leverage the scalability, flexibility, and operational benefits of the cloud to deliver access control, malware protection, threat detection and prevention, anti-phishing protection, and other services to protect users wherever they are.
SMB & Branch Office Firewalls
The firewall market is one of the largest and most mature security technology segments. A firewall is a device that is used to protect a trusted network from an untrusted network, while allowing authorized communications to pass from one side to the other, thus facilitating secure business use of the Internet. As threats have evolved, firewalls have evolved from simple access control devices, incorporating malware protection, threat detection and prevention, anti-phishing protection and other services.
SMB / branch office firewalls must be capable of blocking threats (exploits and malware) that are downloaded off the Internet or transmitted via email. They must be capable of inspecting TLS/SSL encrypted traffic. They must protect users from phishing attacks that trick victims to divulge passwords and other personal information to attackers. SMB / branch office firewalls must do all this while also being easy to use and relatively inexpensive so they may be deployed in branch offices, homes, and small businesses.
This test will be limited to SMB / branch office devices with a maximum of 100 employees and 1 Gb throughput, and in the price range of $2,000 including subscription license.
Threat Hunting & Forensics
An endpoint forensics product provides detection, reporting, and remediation capabilities. The visibility these products provide into the behavior of endpoints gives incident response teams the critical information they need to conduct forensic investigations. Continuous monitoring of the endpoint, detection of anomalous activity, and supplying forensic detail to empower incident response are the core features of an endpoint forensics product.
Want to Learn More?
If you would like to learn more, please complete this form or email firstname.lastname@example.org.
Oops! We could not locate your form.