John

Send feedback to John



Recent articles for John

FireMon Security Manager with Policy Planner and Risk Analyzer 
Aug 1, 2012 | Comment Now 
The FireMon Security Manager with Policy Manager and Risk Analyzer is the ultimate policy and risk management tool.
 
ArcSight Logger 5.1 
Jul 31, 2012 | Comment Now 
ArcSight's L7400x compresses log data at an average ratio of 10:1, which equates to about 45TB of log storage space.
 
Drive eRazer Ultra 
Jul 31, 2012 | Comment Now 
Wiebetech's Drive eRazer Ultra is a small standalone product that securely erases IDE and SATA hard disks.
 
G Data EndpointProtection Business 11 
Jul 31, 2012 | Comment Now 
There may be plenty of endpoint security solutions on the market today, but G Data has always stood out for value.
 
Cryptocard Blackshield Cloud 
Jul 31, 2012 | Comment Now 
BlackShield Cloud is designed to be simple to deploy and capable of slotting in neatly with a company's workflow processes.
 
Barracuda Spam and Virus Firewall 900 
Jul 31, 2012 | Comment Now 
Barracuda's extensive family of Spam and Virus Firewall appliances covers virtually every size of business; in this review we take a closer look at the enterprise-level 900 model.
 
Panda Virtual GateDefender Performa 
Jul 31, 2012 | Comment Now 
Businesses can cut costs by virtualising their security appliances, and Panda's latest Virtual GateDefender Performa (VGP) looks to offer some big savings.
 
FortiGate 111C 
Jul 31, 2012 | Comment Now 
Aimed at SMEs and remote office deployments, Fortinet's FortiGate 111C offers a range of security measures that defies belief. Another benefit is that all features are ...
 
Check Point 2210 Appliance 
Jul 31, 2012 | Comment Now 
Check Point's new 2200 Appliance family is designed for SMEs that want affordable enterprise-level network security.
 
Can MSSPs help you stay legal? 
May 13, 2004 | Comment Now 
As organizations adapt to compliance requirements, John Sterlicchi explores the value of having a managed security service provider
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  69%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1023

Vote