Craig MacAlpine is CEO and Founder of Expert Insights. Before founding Expert Insights in August 2018, Craig spent 10 years as CEO of EPA Cloud, an email security provider that rebranded as VIPRE Email Security following its acquisition by Ziff Davis, formerly J2Global (NASDAQ: ZD) in 2013.
Craig is a passionate security innovator with over 20 years of experience helping organizations to stay secure with cutting-edge information security and cybersecurity solutions.
Using his extensive experience in the email security industry, he founded Expert Insights with the singular goal of helping IT professionals and CISOs to cut through the noise and find the right cybersecurity solutions they need to protect their organizations.
We reviewed the leading email encryption platforms on the strength of encryption implementation, the friction they introduce for recipients, and how well the admin controls support compliance and audit requirements.
We reviewed DMARC platforms built for MSP deployments on tenant management depth, white-label reporting quality, and the automation that reduces the manual effort of moving client domains toward full enforcement.
We reviewed the leading business DMARC solutions on reporting quality for identifying unauthorized senders, ease of moving from monitoring to enforcement, and how well each surfaces domain spoofing attempts before they reach targets.
We reviewed the leading anti-impersonation and spoofing solutions on DMARC enforcement depth, display name spoofing detection, and how well each identifies the lookalike domains that attackers use to conduct convincing phishing campaigns.
We reviewed the leading CASB platforms on cloud application discovery depth, DLP enforcement, and how well they integrate with existing identity and network security controls.
We reviewed the leading secret management platforms on vault architecture, secrets rotation automation, and how well they integrate with CI/CD pipelines where credentials are most often exposed.
We reviewed the leading DevSecOps tools on how well they integrate into CI/CD pipelines, the depth of automated security checks at each pipeline stage, and whether developer-facing output drives faster fixes or just longer review queues.
We reviewed the leading BEC protection solutions on the accuracy of sender impersonation detection, how well each identifies payment redirect fraud, and the speed at which suspicious communications are flagged for human review.
We reviewed the leading phishing protection platforms on detection accuracy, response speed, and how well technical controls complement awareness training to reduce overall click-through risk.
We reviewed email security platforms built for MSP environments on tenant isolation, white-label options, and the automation that matters most when you are managing security at scale.
We reviewed the leading email security platforms on threat detection coverage, deployment complexity, and how well each handles the full range of attacks targeting business email. Here's what we think organizations should be running.
We reviewed the top business password managers on encryption architecture, admin visibility, and team sharing controls. Our top picks are Dashlane, Keeper, Proton, and NordPass.
We reviewed 12 Secure Web Gateway platforms on filtering accuracy, HTTPS inspection depth, and the application controls that prevent employees from moving data to unauthorized destinations.
We reviewed the leading email archiving platforms on search performance under large data volumes, retention policy flexibility, and the eDiscovery workflows that legal and compliance teams rely on when records are requested.
We reviewed the leading M365 backup platforms on workload coverage, recovery granularity, and how well they handle eDiscovery requests alongside standard data restoration. Native M365 tooling does not replace what these platforms deliver.
We reviewed the leading zero trust security platforms on identity verification depth, the granularity of resource segmentation, and how well each supports phased implementation for organizations transitioning from perimeter-based architectures.
We reviewed the leading ZTNA platforms on identity-aware access enforcement, the granularity of application segmentation, and how well each handles policy enforcement for unmanaged devices accessing corporate resources.
We reviewed the leading DNS web filtering platforms on the accuracy of threat category classification, policy control granularity, and how well each handles enforcement across remote and off-network devices.
We reviewed the leading KnowBe4 alternatives on training content freshness, the sophistication of phishing simulation templates, and the behavioral reporting that shows whether training is translating into lower click rates.
We reviewed 10 phishing awareness training platforms on simulation quality, content engagement, and the reporting that tells you which employees remain your highest risk. Click rates alone are not enough.
We reviewed 11 security awareness training platforms on content engagement, simulation realism, and behavioral change metrics. The best ones show measurable risk reduction; the weakest ones show completion rates.
We reviewed 10 platforms that sit natively inside cloud email environments. The gap between the strongest and weakest on compromised account detection was significant.
We reviewed the leading email security platforms built for Google Workspace on how effectively they extend native protection, the depth of BEC detection, and how well they handle threats that arrive through legitimate-looking senders.
We reviewed 12 email security platforms built for Microsoft 365 environments. The best ones extend native Defender capabilities; the weakest ones duplicate them.
by Craig MacAlpine
We reviewed the leading email spam filtering platforms on catch rates, the false positive rates that determine whether legitimate email gets blocked, and how well each handles the phishing and malware payloads hidden in spam campaigns.
We reviewed the leading browser isolation platforms on the fidelity of the isolation environment, how well DLP policies hold up for downloads and uploads, and the performance trade-offs that determine whether employees will actually use the solution.
We reviewed the leading SSO platforms on the number and quality of application integrations, MFA enforcement options, and how well they handle hybrid environments with on-premises and cloud applications.
We reviewed 9 UEM platforms on the range of device types and operating systems they manage consistently, the depth of application lifecycle controls, and the policy enforcement that applies uniformly across corporate and personally-owned devices.
We reviewed 10 remote assistance platforms on connection stability under real-world network conditions, session recording capabilities, and the multi-user features that matter when complex issues require escalation during an active support session.
We reviewed the leading SharePoint Online backup solutions on site, library, and item-level recovery granularity, how well each handles versioned content, and the restoration speed that determines how long SharePoint is unavailable after a loss event.
We reviewed the leading Active Directory recovery tools on the granularity of object-level restoration, how quickly each can perform a full forest recovery, and whether the backup architecture protects against the ransomware attacks that most commonly take AD offline.
We reviewed the leading policy management platforms on the ease of policy creation and distribution, automated review scheduling, and how well each tracks employee acknowledgment in a format that satisfies auditors.