Select Page


We Turn Data into Answers

Our testing organization is the foundation of all we do. Our testing methods use proprietary, commercial, and open source tools and world class analysts in threat research, providing “deep dives” into a security product’s capabilities and limitations. We measure security effectiveness, performance, stability, usability, and cost of ownership. 

And because no other organization does what we do, we reveal information like no one else.

Our Comparative Reports provide unique, multi-product views based on security effectiveness, performance, and total cost of ownership, shown graphically in the Security Value Map™.  The reports are designed for a specific audience:  IT security professionals, networking professionals, and financial decision makers.

Our clients use our detailed comparative test data to shortlist products for more evaluation and proof-of-concept testing. This data can help you compare and understand the products’ ranges of security effectiveness, evasion techniques, manageability, and throughput under real-world conditions. We also discuss the total cost of ownership over three years, including support contracts, maintenance, and upkeep time.

Product Reports offer an in-depth analysis of a single product. These reports evaluate a product’s security effectiveness, performance, manageability, and stability at a deeper level than the typical group test report.

Our Analyst Briefs provide content about emerging information security trends and technology issues. You’ll get the insight, context, and perspective needed to apply our research to specific issues in your organization.

Need actionable information? Contact Us