UpGuard Articles

Share

     

Share with your co-workers and friends.

Featured Downloads

PCI Compliance eBook

PCI Compliance Without The Headache

Download Now
Containerizing Apache with Docker

Containerizing Apache with Docker

Download Now
The DevOps Toolchain eBook

The DevOps Toolchain

Download Now

ServiceNow vs JIRA

Ticketing systems are essential to today's enterprise IT help desk operations—without them, service requests and issues would end up lost inside a flurry of emails and handwritten notes. Both JIRA's Service Desk and ServiceNow are leading solutions in this category; the latter has a 25% share of the IT service management (ITSM) market, while Atlassian—though more software developer-focused—is a household name when it comes to project management and collaboration tools.

Read More

Topics: ITIL, IT security, ITSM

Carbon Black vs CrowdStrike


Network and perimeter-based security remains a crucial pillar of enterprise resilience, but with the rise of new computing models like the cloud and mobile, more emphasis is being placed on protecting endpoints than ever before. And with business processes and communications increasingly take place outside of traditional firewall boundaries, vendors like Carbon Black and CrowdStrike are focused on protecting these potential cyber attack entry points wherever they may be, inside or outside the perimeter network.

Read More

Topics: data breaches, vulnerabilities, continuous security

Tanium vs SCCM

More often, catastrophic outages and security compromises can be traced back to simple misconfigurations and unpatched systems. This isn't to say that elements like pilot error and the workings of nefarious actors are not common—they certainly are—but IT asset misconfigurations tend to be the lowest common denominator in most of these scenarios. That being the case, a plethora of solutions focus on systems management for maintaining strong security and quality of service. Tanium and Microsoft System Center Configuration Manager (SCCM) are two such solutions competing in this space.

Read More

Topics: data breaches, vulnerabilities, continuous security

Tripwire vs OSSEC

Effective cybersecurity is no longer relegated to deep-pocketed enterprises—a myriad of open source solutions can offer adequate protection to the most cash-strapped of organizations. That said, there are some capabilities free just won't get you, but how critical are they in the grand scheme of cyber resilience and are they worth the price tag? Tripwire and OSSEC are two popular solutions on opposite sides of this spectrum; let's see how they stack up.

Read More

Topics: vulnerabilities, continuous security

ServiceNow vs BMC Remedy

When it comes to IT service management (ITSM) platforms, the two main contenders that usually come to mind are ServiceNow and BMC Remedy. Not surprisingly, these two vendors collectively own 50% of the ITSM market, according to Gartner's latest numbers. Let's find out how they compare in helping operations support and deliver enterprise IT services.

Read More

Topics: ITIL, IT security, ITSM

Tripwire vs RedSeal

To survive in today's cyber threat landscape, enterprises increasingly rely on layered defenses to smooth out attack surfaces. A variety of tools are available to cover all parts of the security continuum: security information and event management (SIEM), security configuration management (SCM), vulnerability detection, and more. Tripwire and RedSeal are two platforms that cover different, but equally important, aspects of enterprise security—let's see how they stack up in this comparison.

Read More

Topics: vulnerabilities, continuous security

Hack The Vote!

Happy Election Day! As you head to the polls to vote, take a moment to check out this article from UpGuard's cybersecurity researchers analyzing the shadowy campaign financing organizations that helped fund this election - and how their activities might not remain so secret for long, if hackers have their way.  Now go vote!
Read More

Topics: cyber risk, government, cybersecurity

AlienVault vs QRadar

It's not uncommon for organizations to encounter hundreds of security incidents on a daily basis—from the trivial poking and prodding of script kiddies to nefarious activities that constitute the inner workings of advanced persistent threats (APTs). Transforming this volume of data into actionable information is impossible without the assistance of security intelligence, specifically, the analytic capabilities of security information and event management (SIEM) tools. AlienVault USM and IBM QRadar are two leading platforms that focus heavily on these areas—let's see how they stack in this comparison.

Read More

Topics: vulnerabilities, continuous security

Splunk vs ELK

Log management solutions play a crucial role in an enterprise's layered security framework without them, firms have little visibility into the actions and events occuring inside their infrastructures that could either lead to data breaches or signify a security compromise in progress. Splunk and ELK (a.k.a BELK or Elastic Stack) are two of the leading enterprise solutions in this category; let's see how they stack up in this comparison.

Read More

Topics: vulnerabilities, continuous security

Tripwire vs AIDE

Fee versus free, how do the two compare when it comes to intrusion detection? Specifically, how does the open source Advanced Intrusion Detection Environment (AIDE)—commonly referred to as the free Tripwire replacement—stack up against Tripwire Enterprise, the longstanding leader in this category? 

Read More

Topics: vulnerabilities, continuous security

UpGuard Customers