How We Test & Review Products

Last updated on Apr 8, 2026 7 Minutes To Read
Joel Witts Written by Joel Witts

At Expert Insights, we help IT and security leaders cut through vendor noise and find the right cybersecurity solutions for their organizations. With over 3,400 vendors in the market, making the right choice requires hands-on testing, direct conversations with product teams, and honest, practitioner-focused analysis.

This page explains exactly how we research, test, and review the products that appear in our shortlists and individual product reviews.

For details on how we maintain editorial independence, our governance standards, and how advertising does and does not affect our content, see our Editorial Process page.

Editorial Independence

Our reviews are never influenced by commercial relationships. Editorial and commercial teams operate independently, and no vendor can pay for a better score, favorable review, or editorial positioning. Our editorial team has final say on all published content. For full details on how we maintain independence and how advertising does and does not affect what you see, read our Editorial Process.

How We Build Our Shortlists

Our ‘Top 10’ lists (e.g., ‘Best Secure File-Sharing & Storage Services’) are designed to give IT buyers a practical, curated starting point. Here’s how we build them:

Market Research

Before any testing begins, we map the full vendor landscape for each category. We identify all active vendors — from market leaders to emerging challengers. We review analyst reports from Gartner, Forrester, and IDC to understand market positioning. We analyze verified customer reviews across G2, TrustRadius, and Gartner Peer Insights for real-world user sentiment. And we consult with CISOs, IT managers, and industry practitioners to understand which features matter most in practice.

Hands-On Product Testing

Where possible, our analysts deploy and test each product directly. This is what sets our reviews apart from aggregated comparison sites. Our hands-on testing typically covers deploying the product in a controlled environment that simulates real-world enterprise conditions, evaluating the setup and onboarding experience, testing core functionality against a standardized criteria framework specific to the product category, assessing the management console for usability and day-to-day operational workflow, testing integration capabilities with common enterprise tools and platforms, evaluating reporting, compliance, and governance features, and where applicable, testing detection, protection, or security capabilities using industry-standard frameworks.

We document the specifics of our testing in a ‘How We Reviewed’ section within each product review, including what we tested, which operating systems or environments we used, and when the testing took place.

Speaking With Product Teams

In addition to hands-on testing, we often speak directly with product teams to understand recent feature developments and how they address real customer pain points, product direction and roadmap priorities, architecture decisions and how the product is designed to scale, and known limitations the vendor is working to address.

When we include information about upcoming features based on vendor briefings rather than our own testing, we clearly state this — for example: “We haven’t been able to test these features yet — but details are provided below.”

How We Score Products

When we conduct a long-form product review, each product receives an Editor’s Score out of 5, assigned by the reviewing analyst based on their hands-on assessment. This score reflects the product’s overall quality, not just a checklist of features.

Scores are informed by our evaluation across the following criteria, weighted according to each product category:

Evaluation CriteriaWhat We Assess
Core FunctionalityDoes the product deliver on its primary use case? How does its feature set compare to competitors in the same category?
Ease of DeploymentHow long does it take to get up and running? How much configuration friction is involved? We document deployment time in our reviews.
Management & UsabilityIs the admin console intuitive? Can IT teams manage the product efficiently at scale without extensive documentation?
Integration EcosystemDoes it integrate with existing security stacks, identity providers, SIEM/SOAR platforms, and cloud services?
Scalability & ArchitectureCan the solution grow with your organization? How does it handle multi-site or multi-tenant deployments?
Governance & ComplianceWhat RBAC controls, audit logging, and compliance reporting does the product offer? We test these features directly.
Customer Support & DocumentationWhat support channels are available? How responsive is the team? Is the documentation sufficient for self-service?
Pricing & ValueHow does pricing compare to alternatives? Is pricing transparent and predictable? We include pricing details where publicly available.
Real-World Customer FeedbackWhat do verified users say? We analyze reviews across multiple platforms to identify consistent strengths and weaknesses.

What Our Reviews Include

Every product review on Expert Insights follows a consistent structure designed to give IT buyers the information they need to make a decision:

Editor’s Score: A score out of 5, reflecting the analyst’s overall assessment based on hands-on testing.

The Bottom Line: A concise summary of who the product is best suited for and why.

Pros & Cons: An honest breakdown of the product’s strengths and weaknesses, drawn from our testing.

How We Reviewed: A transparent section explaining exactly what we tested, when, and how — including which environments and operating systems we used.

In-Depth Analysis: Detailed coverage of key feature areas, with specific observations from our hands-on testing.

Pricing: Available pricing information, with a note to contact the vendor when pricing is not publicly disclosed.

Upcoming Features: Where we’ve been briefed on unreleased features by the product team, we include these with a clear disclaimer that we haven’t tested them yet.

Final Verdict: Our overall recommendation, including who the product is and isn’t a good fit for.

Review & Fact-Checking Process

Before publication, every piece of content goes through a multi-stage review:

Technical accuracy review: A second analyst verifies technical claims, feature descriptions, and product capabilities.

Editorial review: Our editorial team checks for clarity, consistency, and adherence to our style guide.

Fact-checking: Pricing, feature claims, and vendor details are verified against the most current sources available.

Vendor review: Where applicable, we offer vendors the opportunity to fact-check technical claims. Vendors cannot modify our opinions, scores, or editorial conclusions.

How We Keep Content Current

Publishing a review is the start of an ongoing commitment to accuracy, not the end:

Scheduled reviews: Every shortlist and review is revisited on a regular cadence. When we update a page, the ‘last updated’ date reflects this.

Vendor updates: When vendors release major updates, we reassess and update our reviews. Where we’ve spoken to the vendor about upcoming features, we note this clearly.

Market changes: Significant events — acquisitions, security incidents, major product launches — trigger updates to affected content.

Reader feedback: We actively incorporate feedback from IT professionals who use the products we review.

Our Team

Expert Insights’ research is produced by two teams that work together. Technical review is led by founder Craig MacAlpine, who brings nearly thirty years of experience in email security, enterprise IT, and cybersecurity product deployment — including founding and running EPA Cloud (acquired by Ziff Davis in 2013), and product management roles at VIPRE. The editorial team is led by Joel Witts, Director of Content and co-founder, a trained journalist with a First Class degree from Cardiff University and over eight years focused exclusively on cybersecurity.

Our team includes security professionals with hands-on experience deploying and managing cybersecurity products in enterprise environments, technology journalists who regularly interview vendor leadership at RSA Conference, Black Hat, and other major industry events, cybersecurity engineers and analysts with degrees in cybersecurity and hands-on testing experience, and subject-matter experts with specialized knowledge across cloud security, identity management, email security, endpoint protection, and more.

In specialist areas such as application security and DevSecOps, we bring in experienced software engineers and security practitioners to test products and provide their technical assessment.

Every author’s credentials are displayed on their author profile page, so you can assess the expertise behind each review. For full details on our team leadership and editorial governance, see our Editorial Process page.

What Makes Expert Insights Different

We test products ourselves. Our reviews are based on hands-on deployment and testing, not just vendor demos and datasheets. When we say we deployed an agent in five minutes, it’s because we actually did it.

We talk to the people building the products. Direct conversations with product teams give us insight into architecture decisions, roadmap direction, and known limitations that you won’t find in a feature comparison matrix.

We’re honest about limitations. Every product has trade-offs. Our reviews include clear Pros and Cons, and our Final Verdicts are specific about who a product is — and isn’t — right for.

We show our working. Every review includes a ‘How We Reviewed’ section so you know exactly what we tested and when. If we haven’t tested something, we say so.

We keep our content current. The cybersecurity market moves fast. We regularly revisit and update our reviews to reflect new features, pricing changes, and market developments.

Trusted by over one million businesses worldwide. Expert Insights has been publishing independent cybersecurity research since 2018.

Questions About Our Process?

We welcome questions about our editorial methodology. If you’d like to know more about how we tested a specific product, or if you believe any of our content needs updating, please contact our editorial team.

We take accuracy seriously and value reader input. If you’ve used a product we’ve reviewed and your experience differs from ours, we want to hear about it.

Written By Written By
Joel Witts
Joel Witts Content Director

Joel is the Director of Content and a co-founder at Expert Insights; a rapidly growing media company focussed on covering cybersecurity solutions.

He’s an experienced journalist and editor with 8 years’ experience covering the cybersecurity space. He’s reviewed hundreds of cybersecurity solutions, interviewed hundreds of industry experts and produced dozens of industry reports read by thousands of CISOs and security professionals in topics like IAM, MFA, zero trust, email security, DevSecOps and more.

He also hosts the Expert Insights Podcast and co-writes the weekly newsletter, Decrypted. Joel is driven to share his team’s expertise with cybersecurity leaders to help them create more secure business foundations.