Product Promotion Network

Software Reviews

CyberSight RansomStopper

1Main Window

CyberSight RansomStopper’s main window simply reports that you are protected from ransomware.

Buttons across the bottom let you view alerts, blocked processes, and processes you chose to allow.

There’s also a button to check for updates, if you didn’t select automatic updates during installation.

The Best Performance Management Software of 2018

What Is Performance Management Software?

As a human resources (HR) professional, your most important job is attracting top talent to your organization. But retaining, managing, and helping that talent grow might be an even harder task because it takes more time and commitment from both the employer and the employee. To help remedy this problem, companies of all types and sizes have invested billions into HR software[1].

HR solutions vary in their coverage by they often include features such as applicant tracking[2] (AT), benefits administration, payroll[3], performance management (PR), training, and more. All of these features are designed to foster a healthier and more productive workforce. While there are dedicated PM software platforms and services, for small to midsize businesses (SMBs) in particular, incorporating this toolset as part of an integrated HR tool suite makes more sense.

This is true not just from a cost perspective, but also so that SMBs can more easily track how an employee’s performance is reflected elsewhere on the HR scale (especially payroll for bonuses and compensation, and training for certification and skills advancement).

Comparing PM Software

While we have two Editors’ Choice winners in the features table above, it’s important to note that BambooHR[4] is a holdover from our recent review of all-around HR software and management systems. However, its Editors’ Choice award also stands in this PM category. BambooHR did an exceptional job of integrating a thorough PM feature set into a well-rounded, intuitive HR platform that’s easily accessible by SMB operators.

Along the same line, Deputy is the best scheduling tool on the market but it’s not primarily a PM tool. However, Deputy offers enough solid PM functionality that it warrants your consideration, especially if scheduling and PM go hand in hand within your organization. A new Editors’ Choice award solely for the PM category goes to SAP SuccessFactors[5].

This is a platform that started out dedicated to PM but is quickly evolving into an all-around HR management tool suite. While SAP SuccessFactors didn’t win an Editors’ Choice as an all-around HR solution, it’s by far the best PM tool we reviewed and easily earns the award in this category. When comparing these solutions yourself, it’s good to understand what kinds of features and capabilities are available under the PM umbrella.

As a rule, basic PM should cover some or all of the following three tasks: 1. Goals, feedback, and coaching: The tool should have some way for managers and employees to set long- and short-term goals, track those goals, provide and record manager feedback, and document any coaching provided (as well as how the employee responded to it).

There are many mechanisms a software architect can employ to achieve these capabilities. Therefore, it’s critical to have this work chain demoed to you to make sure it works within your organization’s culture before purchasing. For example, a casual culture might be satisfied by a joint journaling feature that lets both manager and employee keep a free-form log of ongoing coaching and growth.

On the other hand, a more formal process (one dictated by stringent compliance regulations, for example) might require a more structured process involving specific documents and forms, multiple levels of approval, and numeric scoring. 2. Performance review process: Some organizations might be happy with one or two evaluation forms filled out by employee and manager and then stored for future analysis.

Other organizations might refer to this data much more often, necessitating a dashboard-style view of an employee’s performance with up-to-the-minute data on job quality, skills assessment, positive and negative feedback, and more. All of them should at least chime in at the start of the review process, and most can automate that process either through email or document routing. 3.

Compensation: This is optional and depends on how directly your company links compensation to performance metrics. Some companies, especially SMBs, compensate employees on a more static basis, with performance scores affecting compensation only at extreme ends of the scale (basically, more reward for the very good or sanctions for the exceptionally bad). Other companies use performance scores to calculate overall compensation at varying grades even for the same job, including salary, stock options, and even benefit tiers.

This is where HR tool suites, including both PM and payroll capabilities, provide adjustable formulas and calculators designed specifically to crunch those numbers. While this does generally present more work, it can pay dividends not only in motivating employees to do better but also in maximizing your investment in each individual.

Tying It All Together

For many years, most of us have grown accustomed to PM being an annual chore conducted primarily by an immediate supervisor and an HR professional many of us never even meet. Goals are designed to be achieved on at least a semi-annual basis and are reviewed only once every six or 12 months.

While that has some benefit, most of the tools we reviewed espouse a more agile PM discipline for today’s business managers. By automating the performance process through email, document routing, or dedicated workflow capabilities, many of these tools make PM part of everyday employee management simply by providing a way to track and document employee/manager communication. This isn’t meant to turn an employee’s work life into a police state.

Rather, it’s designed to let performance tracking become more agile and responsive. After all, the job goals and requirements that really matter can change on a daily basis, not a semi-annual one. By providing tools and dashboards that let managers track how an employee is doing on such a cadence, HR gets a much clearer and granular understanding of the employee’s performance, skills, and needs.

The trick is delivering these capabilities in such a way that they don’t become a burden on how managers and employees do their day-to-day jobs. That’s why HR software vendors are putting more emphasis than ever on usability rather than just acting as buckets for annual metrics. Many solutions provide advanced reporting and analytical capabilities, including new ways to build custom reports and features, letting managers and HR professionals view employee data visually.

Another example is mobile access, which seems like a superfluous feature until you view it under this new HR-all-the-time lens. In a culture where PM is part and parcel of daily employee management, offering mobile access to dashboards and communications capabilities is critical to long-term success. The bottom line is, if you’re in the market for HR and PM software today, then take a moment to re-evaluate how your company can use these disciplines to more effectively manage your workers.

The software vendors presented in this PM review roundup have worked hard to not only deliver basic HR capabilities, but they also give you new ways to benefit from HR, maximize your employee investment, and retain top talent.

Featured Performance Management Software Reviews:

References

  1. ^ HR software (uk.pcmag.com)
  2. ^ applicant tracking (uk.pcmag.com)
  3. ^ payroll (uk.pcmag.com)
  4. ^ BambooHR (uk.pcmag.com)
  5. ^ SAP SuccessFactors (uk.pcmag.com)

The Best Hosted Endpoint Protection and Security Software of 2018

Nothing in IT changes more quickly and requires more sophistication than effective network and data security. That’s difficult for enterprises who can afford specialist staffers, but it’s difficult for budget-conscious small to midsize businesses (SMBs) even though those organizations face the same security challenges as their larger counterparts. Although precise estimates vary, somewhere around half of all security incidents affect organizations with less than 1,000 employees.

Sure, data breaches at the IRS and Target are what make the news, but it’s important to remember that the threats to SMBs are very real and just as common, even if staggering dollar figures aren’t always involved. In many cases, an SMB’s IT administrator faces the same threats that teams of his or her enterprise counterparts face, except that he or she is likely to face them alone while trying to deal with 20 completely unrelated issues at the same time. This makes designing a security solution for an SMB audience a difficult contrast between ease-of-use and state-of-the-art technology shielding.

Small fish still make big target, though. In a Visa[1] and National Cyber Security Alliance[2] (NCSA) survey of 1,000 small business owners, 85 percent of respondents believed that enterprises are more targeted than they are, yet another survey by the same group found that 20 percent of small businesses suffered a data breach in 2013. So, as long as your data holds value, criminals don’t care how big your company is.

Data that holds value includes employee and customer personal and banking information, sensitive corporate intellectual property (IP), sales and product information, and company financial information such as payroll data. There’s also another angle: Criminals can use the systems of a small business to exploit trust relationships with larger businesses. If this is the case, then the small business is held responsible for the damages done.

In fact, some hackers actively target small businesses precisely because they’re small. Since they don’t have the resources necessary to adequately shield against intrusion, they’re the low-hanging fruit, and many carry information just as valuable as that of larger organizations, especially in aggregate. It takes less effort to steal financial data and act on it.

Furthermore, because no defenses are in place, the attacks are extremely difficult, if not impossible, to trace without enough logged data to use in a typical forensics process.

Small But With High Stakes

Obviously, the stakes are high in SMB security. Therefore, selecting hosted endpoint protection and security software is a critical decision for IT admins of SMBs. In many ways, you’re choosing a partner that is going to help you secure servers, desktops, laptops, and mobile devices.

This is likely to be a long-term partnership because you don’t want to evaluate software solutions, roll one out, remove it, re-evaluate, and re-deploy. So, look for someone who has a track record of combating threats by evolving, refining, and adding new protection tech as applicable. This partnership is solidified when you choose a Software-as-a-Service (SaaS) package instead of an on-premises package because, instead of buying software that you run yourself, you’ll have daily interactions with software that’s administered and updated by your vendor.

SaaS, or cloud-based, hosted endpoint protection and security software has the advantage of reducing the complexity formerly required by their on-premises predecessors that typically run on dedicated servers. SaaS hosted endpoint protection and security software saves you a great deal of time and effort that would otherwise have gone into hardening and patching the underlying server operating system (OS) and patching the management console and its underlying infrastructure. This is not to say that there isn’t significant value in keeping your environment patched.

Endpoint protection is typically the last line of defense. It’s better to limit exposure to threats in the first place and one of the best ways, bar none, is to keep up to date on your patch management chores. Cloud-based services can also be managed outside the office, meaning that admins can manage their endpoint protection on the road or from branch offices by using multiple kinds of internet-connected devices, without loss of function or security.

That’s possible to do when the management server is run on-premises but usually with significantly increased difficulty. In many cases, a hosted management console can be easily accessed and used from a mobile device. As an SMB security admin, imagine getting an email alert on your phone that the business owner has encountered malware, and then being able to log in to the management console from your phone’s browser and initiate remediation activities.

Another important advantage is that SaaS software solutions provide protections and updates to devices that are off the corporate network. When your co-workers take their laptops on the road with them, they continue to be protected and you retain the ability to monitor and manage their devices. Previously, once a laptop left the office, a security admin might have had to wait until it returned (or was connected via a virtual private network or VPN) to assess its security status, push updates, adjust policy, or remediate threats.

In some cases, this actually extends beyond the endpoint protection software and includes things such as being able to patch the OS and related software remotely. As mentioned earlier, this can have just as big of an impact, if not a bigger one, than simply ensuring that the threat database is current. Many SMBs’ employees rely heavily on mobile devices to do their jobs.

This means that mobile platforms represent as rich a target to hackers and malware as office-based systems. Many businesses overlook mobile device security, leaving this data-rich target unprotected or entirely in the hands of employees who may or may not deploy consumer-grade protections. Security vendors are responding to these threats and have added protections for Android and iOS tablets and smartphones.

Make sure to ask endpoint protection software solution providers if mobile is included (or at least available) and can be managed through the same hosted user interface (UI). You’ll find richer security support for Android than for iOS. Much to the chagrin of customers, Apple selfishly continues to push its marketing agenda that iOS devices are safe from malware and refuses to work with security vendors.

Vendors offer to manage devices (e.g., locate and remote wipe) and security policy (e.g., password strength, application control, and Wi-Fi settings) for Android and iOS while offering full security software (e.g., anti-malware app scanning, firewall, and intrusion prevention) only for Android. That doesn’t mean that iOS can’t support useful security software because it can, just with a few more hoops than Android. However, there’s VPN and Safe Browsing apps already included in most implementations of iOS so there may be less need for third-party solutions.

Evaluating the Software

Picking the right hosted endpoint protection and security software solution is an important decision for an SMB.

Choosing the wrong product could result in creating a false sense of security amongst users and management, and creating a management nightmare for admins. Products that are needlessly complex are fine for enterprise security admins who live and breathe inside a management console. But you don’t want to waste an SMB security admin’s time and effort–two things that are not in overabundance in any SMB.

For this reason, and because there are significant differences between them, management consoles should be a critical decision-making factor when selecting a hosted endpoint protection and security software solution for your SMB. The best management consoles are uncluttered, intuitive, and have context-sensitive Help waiting in the wings. Dashboards should provide a thorough assessment of company-wide security status and, when something is wrong, provide a quick and easy way to dive deeper, assess the issue, and resolve it.

Reports should be helpful and informative whether they are active or passive or both. Policies should be preconfigured using best practices, with the ability to quickly and easily make changes should the admin desire. For a busy SMB security admin, alerts and notifications can be critical time-savers.

Some may choose to stay logged in to a hosted endpoint protection and security software solution, occasionally glancing at dashboards and interactive reports. Others may deploy their agents and then move on to other matters, depending upon notifications and scheduled reports to keep them up to date on the security of users and devices. If this is the case, then pay particular attention to the number of possible notifications (e.g., malware detected, web content policy violated, and potential malicious URLs visited) and the capabilities of the product to manage (e.g., set thresholds and escalations) the alerts.

For traveling employees, it’s also good to look for extras. Some software will include a VPN that will allow secure browsing from coffee shops or when traveling out of the country. This is great for protecting against man-in-the-middle attacks where an attacker will intercept information as it’s being transmitted across the web.

Other handy tools, such as password management software and data shredders, are also not uncommon.

New Demands of Data Safety

Ransomware has been a major cause of concern over the past year and that’s likely to continue in the foreseeable future. Detecting it is a top priority, but the race between hackers and security professionals will always be a close one. When hackers lead the race, it’s important to know how to get that data back.

Part of what today’s endpoint protection solutions should offer is a way to roll back changes that malicious software, such as ransomware, perform on your system. While everyone hopes that their favorite product will win, making sure your data is preserved takes precedence. Digital theft also doesn’t have to take place over the internet.

A good old-fashioned hammer still works on a car window. If a thief runs off with your laptop, then having its data encrypted is the key to not having the incident come back to haunt you later. Typically, once a physical machine is compromised, there is little that can be done to stop an intruder.

But encryption is one of the few methods that’s not only been proven to work but is also cheap and easy to implement. Some endpoint protection products offer encryption management right on their dashboards. For the forgetful road warrior, this can be a life-saver in the event of a scenario such as the one described earlier.

Admins should look for management capabilities in this regard as well; for example, that encryption can be enforced as a policy as opposed to being implemented on a device-by-device basis. In the wake of the recent Equifax breach, it’s more important than ever that endpoint protection software include additional barriers beyond simple antivirus, anti-malware, and anti-phishing software. Even firewalls only partially do the job.

A platform that combines all of these capabilities as a cohesive and well-managed whole is what you should be looking for. Intrusion Detection Systems (IDS) are also sorely needed at the small business level but it has been challenging to afford or understand IDS outside of larger enterprise. This is partially due to a dearth of SMB-oriented software and partially due to a skills gap in SMB versus enterprise IT security professionals.

SaaS solutions, such as the ones reviewed here, can go a long way toward leveling the playing field. In addition, there are certain vulnerabilities which are under-serviced. For example, PowerShell[3], Microsoft’s vision for how the command line should work in the present and future, has been used in a number of new ransomware variants[4].

This is predominantly for convenience and the fact that PowerShell commands tend to be passed off as automatically legitimate. While many enterprises lock down these types of apps for users, small businesses tend to leave them wide open because they’re either required by power users to do so or they’re unaware of the vulnerabilities. This issue is not just limited to PowerShell, however.

Threats that stem from the still-popular Visual Basic for Applications (VBA[5]) also often slip through security nets mainly because they’re so widely used in small business circles as cheap customization and workflow solutions. What makes these types of threats extra dangerous is that they pose as simple Microsoft Word or Microsoft Excel documents. Because macros using VBA are so common, they can easily be passed off as legitimate, letting an attacker compromise and potentially gain control over a victim’s machine.

New Tech for an Old Problem

The challenge, then, is to select a product that can fend off known threats as well as detect odd behavior that hasn’t been seen before.

To help, quite a few endpoint protection products have introduced a form of machine learning (ML) to their anti-malware engines. A sizeable portion of them are also able to detect the style of threats that would be seen during a direct cyberattack, which can more quickly point to a source and a solution. As a bonus, this same tech can sometimes pick up script-based attacks that have, in the past, gone mostly undetected.

This will hopefully put a dent in the successful deployments of ransomware and other data-gathering attacks. As malware and ransomware writers are veering more toward this style of engagement, it’s become a major factor in what will truly add security to a small business. Unfortunately, malware scanners aren’t always sensitive enough to pick up these threats by using just their default settings and increasing the aggressiveness sometimes has a performance impact on users.

Finding the right balance can often be a challenge and may result in some dissatisfied users in the short term. But you need to weigh that carefully against the cost of compromised systems and data. At the end of the day, it becomes a question of, “What’s good enough?” The answer will vary from customer to customer depending on specific needs, custom processes, and risk factors.

However, one thing is clear: The internet is an ocean of dangerous waters and those waters are only getting deeper. Having an adequate defense isn’t just important, it’s critical.

Featured Hosted Endpoint Protection Reviews:

  • [6]

    MSRP: £81.00

    Bottom Line: Bitdefender GravityZone Elite succeeded where the others did not, by stopping a direct attack in a simulated real-world environment. The reporting capabilities and configurability are top-no…

    Read Review[7]

  • [8]

    MSRP: £165.00

    Bottom Line: ESET Endpoint Protection Standard is powerful, easy to use, and comes at a good price.

    While it lags a bit in detecting phishing websites, it excels at detecting exploits locally and from th…

    Read Review[9]

  • [10]

    MSRP: £4.08

    Bottom Line: Symantec Endpoint Protection Cloud is an excellent security product but comes up short in a few annoying ways. It’s missing antiphishing capabilities and lacks a well-rounded reporting featu…

    Read Review[11]

  • [12]

    MSRP: £299.99

    Bottom Line: Kaspersky Endpoint Security Cloud excels at protecting systems, but doesn’t do so well at capitalizing on their cloud management console. While serviceable, this endpoint protection system …

    Read Review[13]

  • [14]

    MSRP: £59.90

    Bottom Line: As a malware detection and prevention platform, Panda Security Endpoint Protection performs well.

    However, against active attackers, it lacks some of the basic defenses that are in place in …

    Read Review[15]

  • [16]

    MSRP: £0.00

    Bottom Line: GFI LanGuard is a powerful and intuitive network security scanner, vulnerability assessment and patch management tool with a great workflow-driven interface. However, outstanding reporting i…

    Read Review[17]

  • [18]

    MSRP: £25000.00

    Bottom Line: Exabeam is an enterprise security software package that’s designed to ferret out security risks and attacks by watching user behavior.

    Read Review[19]

  • [20]

    MSRP: £14.33

    Bottom Line: SaaS endpoint protection software solution Sophos Cloud Endpoint Protection combines an outstanding management console with good protection scores in our lab tests. Server lockdown, user-bas…

    Read Review[21]

  • [22]

    MSRP: £0.53

    Bottom Line: AVG CloudCare is a value-priced, easy-to-deploy and administer, cloud-based endpoint protection solution.

    It offers good protection, but lacks some required business features for larger orga…

    Read Review[23]

  • [24]

    MSRP: £112.49

    Bottom Line: Kaspersky Small Office Security is an extremely basic web management console tacked onto Kaspersky’s consumer product.

    It lacks many of the features businesses require and will only appeal t…

    Read Review[25]

References

  1. ^ Visa (usa.visa.com)
  2. ^ National Cyber Security Alliance (www.staysafeonline.org)
  3. ^ PowerShell (docs.microsoft.com)
  4. ^ new ransomware variants (uk.pcmag.com)
  5. ^ VBA (www.pcmag.com)
  6. ^ (uk.pcmag.com)
  7. ^ Read Review (uk.pcmag.com)
  8. ^ (uk.pcmag.com)
  9. ^ Read Review (uk.pcmag.com)
  10. ^ (uk.pcmag.com)
  11. ^ Read Review (uk.pcmag.com)
  12. ^ (uk.pcmag.com)
  13. ^ Read Review (uk.pcmag.com)
  14. ^ (uk.pcmag.com)
  15. ^ Read Review (uk.pcmag.com)
  16. ^ (uk.pcmag.com)
  17. ^ Read Review (uk.pcmag.com)
  18. ^ (uk.pcmag.com)
  19. ^ Read Review (uk.pcmag.com)
  20. ^ (uk.pcmag.com)
  21. ^ Read Review (uk.pcmag.com)
  22. ^ (uk.pcmag.com)
  23. ^ Read Review (uk.pcmag.com)
  24. ^ (uk.pcmag.com)
  25. ^ Read Review (uk.pcmag.com)

1 2 3 110