Peter Stephenson,

Send feedback to Peter Stephenson,



Recent articles for Peter Stephenson,

SafeNet HASP SRM 
Aug 7, 2009 | Comment Now 
This product may seem quite pricey, but we found that it does offer a lot of software protection and licensing functionality that is practical and easy to implement.
 
Adobe LiveCycle ES 
Jul 23, 2009 | Comment Now 
Whilst this product can be expensive, we find it to be good value for money, based on its ability to control the entire document management process.
 
McAfee Vulnerability Manager 
May 14, 2009 | Comment Now 
McAfee's Vulnerability Manager has a solid feature set which, after initial setup, is easy to use and highly configurable.
 
IBM Proventia Network MFS 
Apr 23, 2009 | Comment Now 
This appliance offers a lot of features in an easy-to-use, inexpensive device.
 
Panda GateDefender Integra 
Apr 23, 2009 | Comment Now 
While it does require the need for recurring subscription costs, this product has many excellent features and there is little learning curve overhead when it comes to managing.
 
Sophos WS1000 
Mar 30, 2009 | Comment Now 
This appliance is packed with solid features and has very little administration or learning curve overhead.
 
Cyber-Ark Software Enterprise Password Vault 
Nov 26, 2008 | Comment Now 
The Cyber-Ark Enterprise Password Vault, or EPV, is a high-end password management powerhouse.
 
Hitachi ID Systems ID-Archive 
Nov 25, 2008 | Comment Now 
The Hitachi ID-Archive sets its focus on password randomisation.
 
Lieberman Software Enterprise Random PM 
Nov 19, 2008 | Comment Now 
The Lieberman Software Enterprise Random Pass­word Manager is a full-on password manager and randomiser for local and domain accounts throughout the enterprise.
 
Proginet Corporation SecurForce 
Nov 19, 2008 | Comment Now 
Proginet SecurForce is a little bit of a horse of a different color for this month's Group Test.
 
Siber Systems RoboForm Enterprise 
Nov 17, 2008 | Comment Now 
On the surface, RoboForm Enterprise starts out looking like a single sign-on product, but that is just on the surface.
 
Symark International PowerBroker 
Nov 10, 2008 | Comment Now 
The Symark PowerBroker is a policy-driven, privileged access control application.
 
Symark International PowerKeeper 
Nov 10, 2008 | Comment Now 
The Symark PowerKeeper is a hardened appliance. It comes with a sealed operating system that provides a secure privileged account access management process to replace the human ...
 
Thycotic Software Secret Server 
Nov 10, 2008 | Comment Now 
The Thycotic Secret Server integrates into the exiting environment to manage and control access to critical privileged passwords using a cen­tral web-based repository.
 
Avoco Secure secure2Trust 
Nov 6, 2008 | Comment Now 
Avoco secure2trust provides many great features for document rights management across the enterprise.
 
LockLizard Safeguard PDF Security 
Oct 24, 2008 | Comment Now 
LockLizard Safeguard PDF Security provides document rights management for PDF files.
 
EMC Documentum IRM 
Oct 17, 2008 | Comment Now 
EMC Documentum IRM (Information Rights Man­agement) brings complete document control and the ever-changing needs of users into one product.
 
Bioscrypt V-Station 
Sep 22, 2008 | Comment Now 
The V-Station is much like the V-Pass (left), but on steroids.
 
Valid Technologies VSSA 
Sep 17, 2008 | Comment Now 
The Valid Secure System Authentication (VSSA) from Valid Technologies has some very unique and flexible features.
 
IdentiPHI SAFsolution 5 
Sep 15, 2008 | Comment Now 
IdentiPHI's SAFsolution 5 Enterprise Edition builds a platform on which an enterprise can integrate biometrics into the already existing environment.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  66%
 
Advanced persistent threats
  4%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1355

Vote