Peter Stephenson

Recent articles by Peter Stephenson

Review: Workshare Enterprise

Review: Workshare Enterprise

Workshare Enterprise takes the data classification aspect of security a step beyond simply classifying data. It applies classifications in the context of a collaborative environment. This is important because many collaborations include sensitive aspects and documents, and it is beneficial to limit the scope of distribution before, during and after the project's completion.
Nov 18 2013 4:06PM
Review: Barracuda Web Application Firewall (Model 660)

Review: Barracuda Web Application Firewall (Model 660)

Barracuda Networks is a venerable company with a rapidly growing line of security tools. Once known primarily for email security, Barracuda now provides a host of products, such as the Web Application Firewall (Model 660), a useful tool that provides protection for web applications.
Nov 18 2013 4:00PM
Review: BIG-IP Application Security Manager (ASM)

Review: BIG-IP Application Security Manager (ASM)

The BIG-IP 4200v with ASM from F5 is well-stocked with unique, useful features. For example, when used with F5's IP Intelligence Service, the 4200V takes advantage of IP reputation, context and categorization to analyze incoming and outgoing IP addresses.
Nov 18 2013 3:58PM
Review: FortiDB-1000C

Review: FortiDB-1000C

Fortinet is well-known for its products, and those we have reviewed in the past exhibited high quality response to a variety of challenges. The FortiDB-1000C did not disappoint us in this regard. It is one of a long string of Fortinet successes.
Nov 14 2013 3:14PM
Review: SecureSphere X1010 Web Application Firewall X1010

Review: SecureSphere X1010 Web Application Firewall X1010

Right out of the box, Imperva's SecureSphere X1010 Web Application Firewall X1010 presented a slight learning curve to get it configured, as all the documentation was not available right away. But, it can be set up with SSH and/or a console, making this step a little easier. Once the base initialization is done, the web-based user interface is user friendly with the main categories lining the top of the screen with drop-downs and subcategories after click.
Nov 14 2013 3:11PM
Review: SecureSphere Database Activity Monitoring (X2500)

Review: SecureSphere Database Activity Monitoring (X2500)

SecureSphere Database Activity Monitoring hardware appliance by Imperva is a well put together and configured machine that provides outstanding protection to both web and database servers.
Nov 14 2013 3:08PM
Review: McAfee Database Security Solution

Review: McAfee Database Security Solution

The McAfee Database Security Solution software is a solid buy for any enterprise. It includes McAfee Vulnerability Manager for Databases, McAfee Database Activity Monitoring and McAfee Virtual Patching for Database. It comes with plenty of documentation, a solid user interface and all is easy to install and implement.
Nov 14 2013 3:03PM
Review: Avatier Identity Management Suite (AIMS) v9

Review: Avatier Identity Management Suite (AIMS) v9

AIMS provides a complete set of identity management (IdM), network access control (NAC) and data leakage prevention (DLP) features.
Oct 9 2013 4:33PM
Review: Bradford Networks Network Sentry v6.1

Review: Bradford Networks Network Sentry v6.1

Network Sentry is delivered through an appliance, virtual server or cloud service (for this evaluation, Bradford provided a hardware appliance).
Oct 9 2013 4:31PM
Review: Centrify Suite 2013.2 Platinum Edition

Review: Centrify Suite 2013.2 Platinum Edition

Centrify Suite 2013.2 Platinum Edition includes features such as DirectControl, DirectAuthorize, DirectAudit and DirectSecure. By leveraging an existing infrastructure enterprise (such as Microsoft Active Directory), these provide central control and securing and auditing of user access through cross-platform systems, mobile devices and applications.
Oct 9 2013 4:29PM
Review: Code Green Networks TrueDLP v8.1

Review: Code Green Networks TrueDLP v8.1

TrueDLP is delivered via Code Green Networks' Content Inspection (CI) Appliances. The CI Appliances have dedicated network interfaces for inspecting network traffic. Traffic is inspected for sensitive data (keywords, phrases, file types, structured data) regardless of port, protocol or file type.
Oct 8 2013 3:15PM
Review: Fischer International Identity Fischer Identity v5.2

Review: Fischer International Identity Fischer Identity v5.2

The Fischer International Identity solution is a set of high-availability Java applications for SaaS (software-as-a-service) and on-premise, running on open source or commercial off-the-shelf (COTS) platforms (OS, DB, directory, etc.).
Oct 8 2013 3:12PM
Review: ForeScout CounterACT v7.1

Review: ForeScout CounterACT v7.1

ForeScout CounterACT offers an enterprise-class NAC platform that assures network access based on real-time endpoint classification, configuration assessment, user and endpoint compliance policy and automated response.
Oct 8 2013 2:58PM
Review: Hitachi ID Management Suite v8.2.1

Review: Hitachi ID Management Suite v8.2.1

The Hitachi ID Management Suite v8.2.1 contains several identity management components that are well integrated to form a fairly comprehensive suite. The package includes Hitachi ID Identity Manager, which features tools to automate user access to resources; Password Manager, which allows for password synchronization across the enterprise; and Privileged Access Manager, which manages access to privileged accounts; along with added functionality from Group Manager and Access Certification.
Oct 8 2013 2:57PM
Review: Lieberman Software Enterprise Random Password Manager v4.83.6

Review: Lieberman Software Enterprise Random Password Manager v4.83.6

The Enterprise Random Password Manager (ERPM) from Lieberman Software is more than just a random password generator. This product allows for full management of enterprise privileged accounts, ensuring that all accounts are secured with a unique and complex password. This product can automate discovery, monitoring and auditing of administrator or super-user accounts, service accounts and application-to-application passwords. Once setup, ERPM can be set to be fully automated, which eliminates the need to manually track and change privileged account passwords throughout the environment at regular intervals.
Oct 3 2013 3:25PM
Review: NetIQ Identity Manager v4.0.2

Review: NetIQ Identity Manager v4.0.2

Identity Manager from NetIQ provides tools for managing the entire user identity lifecycle - from on-boarding through deletion and everything in-between. This product helps administrators automate user identity provisioning and access management, ensuring all users have one identity across all the platforms throughout the enterprise environment. This provisioning extends across not only the physical network, but also to virtual networks and cloud systems.
Oct 3 2013 3:23PM
Review: Pleasant Solutions Pleasant Password Server v4.1.7

Review: Pleasant Solutions Pleasant Password Server v4.1.7

The Pleasant Password Server from Pleasant Solutions provides a way to add central management capabilities to the KeePass Password Safe, a free, open source password manager. This allows administrators to keep user Password Safe data stores secure and encrypted in-house without having to use the cloud or have users manage their own Password Safe. Users can use the Password Safe to store passwords, PINs, credit card numbers, license keys and any other sensitive data. With this product deployed, users can easily access their Password Safe via a KeePass client application or through an intuitive web interface that only requires a web browser and an internet connection.
Oct 3 2013 3:21PM
Review: Axway MailGate SC

Review: Axway MailGate SC

Axway MailGate SCThe MailGate SC from Axway incorporates email security with safeguard collaboration functions. It can provide full email security - including protection from inbound spam and viruses; outbound content management, including regulatory compliance policy management; and email encryption options, as well as additional secure file-sharing through its integrated DropZone Secure Collaboration feature. DropZone can be used by employees to securely share files both internally and externally without having to use other cloud-based file-sharing platforms.
Sep 11 2013 11:41AM
Review: Barracuda Spam and Virus Firewall

Review: Barracuda Spam and Virus Firewall

The Spam and Virus Firewall from Barracuda Networks provides solid inbound and outbound email security functionality through a feature-rich appliance.
Sep 10 2013 4:57PM
Review: Cisco Email Security

Review: Cisco Email Security

The Cisco Email Security virtual appliance offers a full set of inbound and outbound email security and control features.
Sep 10 2013 4:54PM

Log In

Username:
Password:
|  Forgot your password?