Skip to main content
Giveaway

๐Ÿ› ๏ธ Cybersecurity Tools Showdown: Share, Discover, and Win! ๐Ÿ†

๐Ÿ› ๏ธ Cybersecurity Tools Showdown: Share, Discover, and Win! ๐Ÿ†
TylerM
Administrator
Forum|alt.badge.img+25
  • Sr. Security Analyst & Community Manager
  • 1269 replies

Happy Thursday, cybersecurity enthusiasts! ๐ŸŒ

 

In today's ever-evolving digital landscape, having the right cybersecurity tools is crucial to safeguard our systems and data. We invite you to join us in discussing your favorite cybersecurity tools, regardless of the vendor or platform. ๐Ÿ–ฅ๏ธ

 

โ€œregardless of the vendor or platformโ€ ๐Ÿ˜

 

The participant who shares the most useful tool, as voted by our expert panel, will win a $25 Amazon Gift card ๐Ÿ† 4 winners will be announced Monday.

 

Here's how to participate:

1๏ธโƒฃ Share your favorite cybersecurity tool, explaining its features, benefits, and what sets it apart from others. Bonus points for OpenText Cybersecurity Products.

2๏ธโƒฃ Describe a real-life scenario in which the tool has proven to be invaluable. Bonus points for OpenText Cybersecurity Products.

3๏ธโƒฃ Engage with fellow participants by asking questions, providing additional insights, or sharing your own experiences with different tools.

 

This is a fantastic opportunity to discover new tools, learn from others' experiences, and strengthen our collective cybersecurity knowledge. So, let's get the conversation started and help each other become more cyber-resilient!

Remember to be respectful and open-minded as you engage with fellow community members. We're all here to learn and grow together. Happy tool-sharing, everyone! ๐ŸŽ‰

 

The first 10 community members who comment will win some SWAG (if you havenโ€™t already won it)

SWAG

 

Did this help you find an answer to your question?

23 replies

Rodney18
New Member
Forum|alt.badge.img
  • New Member
  • 60 replies
  • April 6, 2023

Carbonite has been a great tool for us and we recommend it to all our customers. We had one customer that had a hard drive die several years ago, and fortunately we had her setup with Carbonite, we put in a new Solid State Hard Drive, and recovered all her data from her Carbonite backup, then several years later the Solid State Hard Drive died, she ended up purchasing a new computer and once again we were able to restore all her data from her Carbonite Backup, I think that is one customer that will have Carbonite for life :)


  • New Voice
  • 21 replies
  • April 6, 2023

We are using Wazuh for some time now. Being open source is a great value for SMEs, especially since paid SIEM solutions are pretty expensive.

All their integration with OSquery and such, correlation with MITRE and regulatory like GDPR, HIPAA, PCIDSS; plus the CIS benchmarks and the vulnerability assessment built in; not even mentioning the ability to ingest so much syslog sources; yet in a free product is just unbelievable.
It helps a lot service providers who actually bring expertise in addition to great products.

It helped us figure out what was happening within the customers infrastructures and the foothold of hackers or insider threats as well as prevent further attacks with vulnerability patching and OS hardening.


TripleHelix
Moderator
Forum|alt.badge.img+63
  • Moderator
  • 9009 replies
  • April 6, 2023

Awesome and I want to try Zix in the near future!


Jasper_The_Rasper
Moderator
Forum|alt.badge.img+54

I love the combined protection of Webroot Complete and Voodooshield.
Since I started using Webroot I have never had a problem and with Voodooshield warning about anything suspicious, although I am not complacent it seem like a great combination.
The added bonus of using them is that they are both very light on resources unlike some of the large better known vendors.


Forum|alt.badge.img+1
  • New Member
  • 56 replies
  • April 6, 2023

We use webroot for all internal PCs plus customers and found it to be trouble free, easy to roll out and more important end user friendly

Carbonate back up facility has got a number of our customer out of tricky situations

 


ProTruckDriver
Moderator
TripleHelix wrote:

Awesome and I want to try Zix in the near future!

Yes I believe that would be interesting.

Backup tools to include USB Flash Drive,Time Machine and SuperDuper for Cloning on my Mac is most important to me. 


TripleHelix
Moderator
Forum|alt.badge.img+63
  • Moderator
  • 9009 replies
  • April 7, 2023
Jasper_The_Rasper wrote:

I love the combined protection of Webroot Complete and Voodooshield.
Since I started using Webroot I have never had a problem and with Voodooshield warning about anything suspicious, although I am not complacent it seem like a great combination.
The added bonus of using them is that they are both very light on resources unlike some of the large better known vendors.

I couldn't of said it better. ๐Ÿ˜Ž


Sander G.
New Voice

Not a Webroot tool, but I recently stumbled upon WPscan  that can help you with scanning and enumerating WordPress sites you maintain. See how easy it is to find vulnerabilities and extract information like user accounts. With this tool, we noticed security issues on some sites that were managed by a MSP.

Also, Shodan.io helps to alert you if a new service has been discovered (open port) on one of your monitored IP addresses.


Martin.1
Popular Voice
Forum|alt.badge.img+4
  • Popular Voice
  • 424 replies
  • April 7, 2023

We use Webroot, Blackfog, AND obvious a decent backup platform. A very decent combination for complete protection . We have a dedicated NetSec (Security) team that will have more tools that they use, but for me, these are the ACE.


  • New Voice
  • 17 replies
  • April 7, 2023

Sysinternals procmon always nice. https://live.sysinternals.com


Rondolino Cellamare
New Voice

My preference falls on Webroot Endpoint protection often bundled with Malwarebytes EDR.
I may adopt Webroot's EDR solutions in the future


Forum|alt.badge.img+4
  • New Voice
  • 56 replies
  • April 7, 2023

NMAP is an open-source tool that allows network administrators and security professionals to scan and map networks, identify hosts and services, and probe for vulnerabilities. It is widely regarded as one of the most popular and powerful network scanning tools available, with a wide range of features that make it a cornerstone of any cybersecurity toolkit.

Some of the key features of Nmap include:

  1. Host discovery: Nmap can identify all active hosts on a network.

  2. Port scanning: Nmap can scan for open ports on target hosts, helping to identify what services are running on each machine. 

  3. OS detection: Nmap can identify the operating system running on a target machine by analyzing its responses to certain packets. 

  4. Service detection: Nmap can identify the services running on a target machine, including the version number of each service. 

  5. Scriptable interaction: Nmap allows users to create custom scripts that can automate certain tasks, such as fingerprinting a service or probing for a specific vulnerability.

  6. Output customization: Nmap provides a wide range of output options, including XML, CSV, and grep-able formats, making it easy to integrate with other tools and automate workflows.

The benefits of Nmap include its flexibility, scalability, and wide range of features. It can be used to perform a variety of tasks, from basic network mapping to in-depth vulnerability scanning. Its scriptable interaction and customizable output make it highly adaptable to a variety of use cases. Additionally, because it is open-source, it is constantly being updated and improved by a large community of developers and users.

Overall, Nmap is a powerful and versatile tool that provides network administrators and cybersecurity professionals with valuable insights into the security posture of their networks. Its ability to detect and map out network resources, services, and vulnerabilities makes it an essential component of any comprehensive cybersecurity toolkit.


kleinmat4103
Popular Voice
Forum|alt.badge.img+6
  • Popular Voice
  • 512 replies
  • April 7, 2023

I hesitate to heap praise on a non-Open Text backup solution here, but here we go. Please donโ€™t ban me.

We are big fan of Datto for server backups. The ability to quickly spin up a server from a backup locally or in the cloud has saved a partner on multiple occasions. Itโ€™s also so reliable and easy to deploy. We donโ€™t have to worry about whether or not Datto is working. It just works. All the time.

Of the tools we use that help me sleep at night, Datto is near the top.


tmcmullen
Popular Voice
Forum|alt.badge.img+6
  • Popular Voice
  • 177 replies
  • April 7, 2023

For me the most useful tool is AppRiverโ€™s SPAM filtering service. This is a product that sells itself! It is the only product that Iโ€™ve received multiple โ€œthank youโ€ emails from various clients about.  Eliminating the malicious emails from the start eliminates the human error factor. SPAM filtering with App River is a required service for our managed services clients. 


Iโ€™ve personally used Datto SaaS protect in the past. A client requested we restore the last valid copy of a users mailbox, after a disgruntled employee deleted it upon leaving. This wasnโ€™t noticed until after the mailbox was converted as per leaver policy, around after a month.

 

Successfully restored the content without issue. While it is not a Webroot product, this could certainly be used to restore data in the event of a compromised account.


MunkeyMan
New Voice
Forum|alt.badge.img+4
  • New Voice
  • 304 replies
  • April 9, 2023

Webroot SAT, SentinelOne, Acronis BUDR all super valuable and part of our standard security stack. 


  • New Member
  • 5 replies
  • April 10, 2023

I donโ€™t think I saw it mentioned yet, but I consider Huntress to be a critical part of a cybersecurity stack.  Huntress has saved us more than once, both from external actors and users simply clicking things they shouldnโ€™t!  I think it is a value at double its current cost, so it is definitely a great deal!


TylerM
Administrator
Forum|alt.badge.img+25
  • Author
  • Sr. Security Analyst & Community Manager
  • 1269 replies
  • April 10, 2023

Everyone this is great feedback! I appreciate those that shared what you use, even non-OpenText solutions!

 

It was tough, but here are our gift card winners (will be delivered later this week via PM)

@Etienne 

@Sander G. 

@tmcmullen

@Matthew_Williams  


tmcmullen
Popular Voice
Forum|alt.badge.img+6
  • Popular Voice
  • 177 replies
  • April 10, 2023
TylerM wrote:

Everyone this is great feedback! I appreciate those that shared what you use, even non-OpenText solutions!

 

It was tough, but here are our gift card winners (will be delivered later this week via PM)

@Etienne

@Sander G.

@tmcmullen

@Matthew_Williams  

Thank you, @TylerM !


russell.harris
Popular Voice
Forum|alt.badge.img+5

Congrats to the winners. Some great solutions listed


  • New Voice
  • 21 replies
  • April 11, 2023
TylerM wrote:

Everyone this is great feedback! I appreciate those that shared what you use, even non-OpenText solutions!

 

It was tough, but here are our gift card winners (will be delivered later this week via PM)

@Etienne

@Sander G.

@tmcmullen

@Matthew_Williams  

Iโ€™m glad to contribute and share to this great community :)

 

Although, itโ€™s not purely security related, on the same topic, iโ€™d suggest everyone to subsrcibe to the โ€œIT Pro Tuesdayโ€ newsletter (or simply visit the blog posts every tuesday).
They share really great tools and knowledge; and better managing and understanding the systems we support is always a step towards better security.


russell.harris
Popular Voice
Forum|alt.badge.img+5
Etienne wrote:
TylerM wrote:

Everyone this is great feedback! I appreciate those that shared what you use, even non-OpenText solutions!

 

It was tough, but here are our gift card winners (will be delivered later this week via PM)

@Etienne

@Sander G.

@tmcmullen

@Matthew_Williams  

Iโ€™m glad to contribute and share to this great community :)

 

Although, itโ€™s not purely security related, on the same topic, iโ€™d suggest everyone to subsrcibe to the โ€œIT Pro Tuesdayโ€ newsletter (or simply visit the blog posts every tuesday).
They share really great tools and knowledge; and better managing and understanding the systems we support is always a step towards better security.

Cheers @Etienne will check that out! ๐Ÿ‘๐Ÿป


Martin.1
Popular Voice
Forum|alt.badge.img+4
  • Popular Voice
  • 424 replies
  • April 11, 2023
tmcmullen wrote:
TylerM wrote:

Everyone this is great feedback! I appreciate those that shared what you use, even non-OpenText solutions!

 

It was tough, but here are our gift card winners (will be delivered later this week via PM)

@Etienne

@Sander G.

@tmcmullen

@Matthew_Williams  

Thank you, @TylerM !

Well done and congrats, awesome input. 


Reply