Reviews

Review: Microsoft Surface Pro 2 
By Barry Collins | Jan 15, 2014 | Comment Now 
Hybrid tablet formula done right on the second attempt.
 
Workshare Enterprise  
By Peter Stephenson | Nov 18, 2013 | Comment Now 
Workshare Enterprise takes the data classification aspect of security a step beyond simply classifying data. It applies classifications in the context of a collaborative ...
 
Barracuda Web Application Firewall (Model 660) 
By Peter Stephenson | Nov 18, 2013 | Comment Now 
Barracuda Networks is a venerable company with a rapidly growing line of security tools. Once known primarily for email security, Barracuda now provides a host of products, ...
 
BIG-IP Application Security Manager (ASM) 
By Peter Stephenson | Nov 18, 2013 | Comment Now 
The BIG-IP 4200v with ASM from F5 is well-stocked with unique, useful features. For example, when used with F5's IP Intelligence Service, the 4200V takes advantage of IP ...
 
FortiDB-1000C  
By Peter Stephenson | Nov 14, 2013 | Comment Now 
Fortinet is well-known for its products, and those we have reviewed in the past exhibited high quality response to a variety of challenges. The FortiDB-1000C did not disappoint ...
 
SecureSphere X1010 Web Application Firewall X1010 
By Peter Stephenson | Nov 14, 2013 | Comment Now 
Right out of the box, Imperva's SecureSphere X1010 Web Application Firewall X1010 presented a slight learning curve to get it configured, as all the documentation was not ...
 
SecureSphere Database Activity Monitoring (X2500) 
By Peter Stephenson | Nov 14, 2013 | Comment Now 
SecureSphere Database Activity Monitoring hardware appliance by Imperva is a well put together and configured machine that provides outstanding protection to both web and ...
 
McAfee Database Security Solution 
By Peter Stephenson | Nov 14, 2013 | Comment Now 
The McAfee Database Security Solution software is a solid buy for any enterprise. It includes McAfee Vulnerability Manager for Databases, McAfee Database Activity Monitoring ...
 
Review: Lenovo's ThinkPad Helix 
By Sasha Muller | Nov 12, 2013 | Comment Now 
How the hybrid tablet-computer compares with the Surface Pro.
 
Avatier Identity Management Suite (AIMS) v9 
By Peter Stephenson | Oct 9, 2013 | Comment Now 
AIMS provides a complete set of identity management (IdM), network access control (NAC) and data leakage prevention (DLP) features.
 
Bradford Networks Network Sentry v6.1 
By Peter Stephenson | Oct 9, 2013 | Comment Now 
Network Sentry is delivered through an appliance, virtual server or cloud service (for this evaluation, Bradford provided a hardware appliance).
 
Centrify Suite 2013.2 Platinum Edition 
By Peter Stephenson | Oct 9, 2013 | Comment Now 
Centrify Suite 2013.2 Platinum Edition includes features such as DirectControl, DirectAuthorize, DirectAudit and DirectSecure. By leveraging an existing infrastructure ...
 
Code Green Networks TrueDLP v8.1 
By Peter Stephenson | Oct 8, 2013 | Comment Now 
TrueDLP is delivered via Code Green Networks' Content Inspection (CI) Appliances. The CI Appliances have dedicated network interfaces for inspecting network traffic. Traffic is ...
 
Fischer International Identity Fischer Identity v5.2 
By Peter Stephenson | Oct 8, 2013 | Comment Now 
The Fischer International Identity solution is a set of high-availability Java applications for SaaS (software-as-a-service) and on-premise, running on open source or commercial...
 
ForeScout CounterACT v7.1  
By Peter Stephenson | Oct 8, 2013 | Comment Now 
ForeScout CounterACT offers an enterprise-class NAC platform that assures network access based on real-time endpoint classification, configuration assessment, user and endpoint ...
 
Hitachi ID Management Suite v8.2.1 
By Peter Stephenson | Oct 8, 2013 | Comment Now 
The Hitachi ID Management Suite v8.2.1 contains several identity management components that are well integrated to form a fairly comprehensive suite. The package includes ...
 
Lieberman Software Enterprise Random Password Manager v4.83.6 
By Peter Stephenson | Oct 3, 2013 | Comment Now 
The Enterprise Random Password Manager (ERPM) from Lieberman Software is more than just a random password generator. This product allows for full management of enterprise ...
 
NetIQ Identity Manager v4.0.2 
By Peter Stephenson | Oct 3, 2013 | Comment Now 
Identity Manager from NetIQ provides tools for managing the entire user identity lifecycle - from on-boarding through deletion and everything in-between. This product helps ...
 
Pleasant Solutions Pleasant Password Server v4.1.7 
By Peter Stephenson | Oct 3, 2013 | Comment Now 
The Pleasant Password Server from Pleasant Solutions provides a way to add central management capabilities to the KeePass Password Safe, a free, open source password manager. ...
 
StillSecure Safe Access v6.1  
By Peter Stephenson | Oct 3, 2013 | Comment Now 
Safe Access from StillSecure is a feature-rich network access control appliance that can detect and monitor many types of endpoints throughout the network and ensure they ...
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  69%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  10%
 
Denial of service attacks
  6%
 
Insider threats
  11%
TOTAL VOTES: 1088

Vote