• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Security Scoreboard Adds Analytics to Crowd-Sourced Product Reviews

    January 26, 2011 Alex Woodie

    IT decision makers who wonder how well a particular security product actually works in the real world may want to check out the website of Security Scoreboard, where crowd-sourced product reviews of commercial security products are on display for all to read. The Silicon Valley startup took a step up last week when it announced a new CEO, venture capital investment, and the addition of analytic capabilities designed to provide more tailored user recommendations.

    Security Scoreboard (www.securityscoreboard.com) debuted in late January 2010 with plans to become a clearinghouse of product information and reviews for security software and solutions. The idea behind the website was to provide a place for people to share their personal experiences with security tools–the good, the bad, and the ugly–hopefully to the betterment of customers. In this way, one person’s particularly painful encounter with the installation of a certain intrusion detection system (IDS), for example, could become another’s warning to avoid that product. On the other hand, a truly pleasant experience with public key infrastructure (PKI) encryption solution could bode well for another’s foray into this class of product.

    The notion behind the plan is really quite simple, says Dominique Levin, the former LogLogic executive who was named CEO of Security Scoreboard last week. “When we make purchases everyday as consumers, we rely heavily on peer reviews,” she says, citing such popular review sites as Trip Advisor , Yelp, and Amazon. “The most important thing that I look at when I buy something is, ‘What’s the experience of people who have already seen this movie or dined at this restaurant or read this book?’

    “It’s really quite strange to find that something like this doesn’t exist for IT products, especially considering that IT products are much more expensive,” Levin tells IT Jungle. “Significant investments are being made by companies that rely on these products for the core of their business. The notion really is to bring the wisdom of the crowd, the end user, the true experience with those products, to the IT decision-makers.”

    If all goes well, the organization could move beyond security, and provide crowd-sourced information on products outside of the security arena. But since the company’s founders–Levin and noted security expert Boaz Gelbord–are veterans of the security space, that was a logical starting point.

    There is no fee to access to Security Scoreboard or to browse the website. Anybody can begin viewing product reviews by scrolling through the 27 different product categories, or by selecting a vendor’s name. To post a review or to rate a product, participants must register, which is also free. Posters can remain anonymous if they choose, but their identity must be established with Security Scoreboard.

    Many IBM i security software vendors, including Bytware, Bsafe Solutions, Net IQ, PowerTech, and Safestone, are listed on the website. There are no reviews for any of them yet.

    Recently, the company added a new analytics engine that rates vendors in certain product categories. The functionality is getting good reviews from some early users of the website, including Jay Leek, the vice president of international security at Equifax. “The new analytics move Security Scoreboard in the direction from merely showing you what your peers are thinking to making true crowd-based recommendations about which vendor tools to use,” he states in a press release.

    It’s critical for Security Scoreboard to remain neutral and unbiased when it comes to crowd-sourced product reviews and recommendations, Levin says. That’s one of the reasons the company relies on the community to police itself, and identify potentially malicious posters, which is the same technique that Wikipedia uses to keep its content accurate, but also impartial to any one participant’s view.

    The idea is to create a viable community that is trusted and valued enough by users that they seek out Security Scoreboard to share their experiences. “You get a security cycle going where people want to give back. That’s very important,” Levin says, adding that the company is not considering giving users incentives to post their reviews. “You don’t want to skew your sample set and get people to contribute for the wrong reason.”

    Revenue generation is not a priority at this point, as the company does not yet charge for anything. In the future, the website could work as a lead-generation engine for security software vendors through webinars, white papers, and reports.

    “People who come to Security Scoreboard are looking for something,” Levin says. “It’s a community that’s short-listing vendors and solutions. So people who come to the site are there by definition because they are looking to buy something.”

    This article has been corrected. Security Scoreboard was incorrectly referred to as Security Scorecard. The company’s website was also incorrectly listed. IT Jungle regrets the errors.



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    Raz-Lee Security

    Raz-Lee Security is the leader in security and compliance solutions that guard business-critical information on IBM i servers. We are committed to providing the best and most comprehensive solutions for compliance, auditing, and protection from threats and ransomware. We have developed cutting-edge solutions that have revolutionized analysis and fortification of IBM i servers.

    Raz-Lee’s flagship iSecurity suite of products is comprised of solutions that help your company safeguard and monitor valuable information assets against intrusions. Our state-of-the-art products protect your files and databases from both theft and extortion attacks. Our technology provides visibility into how users access data and applications, and uses sophisticated user tracking and classification to detect and block cyberattacks, unauthorized users and malicious insiders.

    With over 35 years of exclusive IBM i security focus, Raz-Lee has achieved outstanding development capabilities and expertise. We work hard to help your company achieve the highest security and regulatory compliance.

    Key Products:

    • AUDIT
    • FIREWALL
    • ANTIVIRUS
    • ANTI-RANSOMWARE
    • MULTI-FACTOR AUTHENTICATION
    • AP-JOURNAL
    • DB-GATE
    • FILESCOPE
    • COMPLIANCE MANAGER
    • FIELD ENCRYPTION

    Learn about iSecurity Products at https://www.razlee.com/isecurity-products/

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    SEQUEL Software:  FREE Webinar. SEQUEL: The Only Data Access Tool. Jan. 26
    ProData Computer Services:  We've added MORE! DBU 9.0 Now Available!
    Four Hundred Monitor Calendar:  Latest info on national conferences, local events, & Webinars

    IT Jungle Store Top Book Picks

    BACK IN STOCK: Easy Steps to Internet Programming for System i: List Price, $49.95

    The iSeries Express Web Implementer's Guide: List Price, $49.95
    The iSeries Pocket Database Guide: List Price, $59
    The iSeries Pocket SQL Guide: List Price, $59
    The iSeries Pocket WebFacing Primer: List Price, $39
    Migrating to WebSphere Express for iSeries: List Price, $49
    Getting Started with WebSphere Express for iSeries: List Price, $49
    The All-Everything Operating System: List Price, $35
    The Best Joomla! Tutorial Ever!: List Price, $19.95

    Drummond Unveils AS2 Certificates Notes/Domino: Less Platform Talk, More Programming Action

    Leave a Reply Cancel reply

Volume 11, Number 3 -- January 25, 2011
THIS ISSUE SPONSORED BY:

Vision Solutions
PowerTech
ManageEngine
Computer Keyes
Twin Data Corporation

Table of Contents

  • Security Scoreboard Adds Analytics to Crowd-Sourced Product Reviews
  • Data Domain Delivers Native IBM i Support
  • MySQL Support Options for IBM i Customers
  • ASCI Delivers Java Support with Job Scheduler
  • Capitalware Unveils New WebSphere MQ Auditing Tool
  • UDO Owner Quiet Over Plans for New ‘Storage Product’
  • Lawson Puts M3 Portal on iPad
  • Gumbo Delivers New Goodies in Dumpster
  • SolarWinds Debuts Application Performance Monitor
  • Drummond Unveils AS2 Certificates

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Power Systems Did Indeed Grow Revenues Last Year
  • The IBM Power Trap: Three Mistakes That Leave You Stuck
  • Big Blue Decrees Its 2023 IBM Champions
  • As I See It: The Good, the Bad, And The Mistaken
  • IBM i PTF Guide, Volume 25, Number 5
  • N2i Gains Traction Among IBM i Newbies
  • Realizing The Promise Of Cross Platform Development With VS Code
  • 2023 IBM i Predictions, Part 3
  • Four Hundred Monitor, January 25
  • Join The 2023 IBM i Marketplace Survey Webinar Tomorrow

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2022 IT Jungle

loading Cancel
Post was not sent - check your email addresses!
Email check failed, please try again
Sorry, your blog cannot share posts by email.