Peter Stephenson,CeRNS,

Recent articles by Peter Stephenson,CeRNS,

Risk is the one constant

Risk is the one constant

Peter Stephenson,CeRNS, May 13 2005 11:56AM Security
Review: Red-Alert PRO and Red Detect

Review: Red-Alert PRO and Red Detect

Red-M's Red-Alert Pro is a wireless intrusion detection probe that senses 802.11 a, b, g, and even Bluetooth activity simultaneously. It logs security threats and feeds the details to a Red Detect server if run in managed mode, or stores it if run standalone. Red-Alert Pro keeps track of connections between known and unknown devices, making an alert whenever a new unknown device is present and informing you of which device(s) the unknown entity is communicating with. If run in standalone mode, the security logs can be accessed via a convenient and intuitive web interface. If run in managed mode, the Red Detect server handles the logs.

Peter Stephenson,CeRNS, May 10 2005 12:00AM Security
Review: RFprotect

Review: RFprotect

This is a flexible, robust, very scalable and multi-purpose wireless security solution. It provides rogue detection, troubleshooting, vulnerability assessment, intrusion detection, performance management and usage accounting. It has a standard Windows GUI with an open source Firebird database that includes a secure, password-protected interface, and can be easily configured both for a small business or a large enterprise.

Peter Stephenson,CeRNS, May 10 2005 12:00AM Security
Review: Wireless Site Management

Review: Wireless Site Management

Computer Associates' Wireless Site Management 4.0 is a fully featured WLAN security and management suite. The software is mainly aimed at larger organizations, but it could be implemented for any company running a wireless network.

Peter Stephenson,CeRNS, May 10 2005 12:00AM Security
Review: AirDefense Enterprise

Review: AirDefense Enterprise

AirDefense Enterprise is one of those wireless-security products that integrates into the enterprise as an integral part of the overall network management scheme.

Peter Stephenson,CeRNS, May 9 2005 12:00AM Security
Review: BlueSecure

Review: BlueSecure

BlueSecure from Bluesocket is a leader in its field. Why? Because while most wireless security products are not able to detect anyone walking up with a wireless capable computer and connecting to their network, BlueSecure detects computers, access points, or any other type of wireless connection device.

Peter Stephenson,CeRNS, May 9 2005 12:00AM Security
Review: OmniPeek

Review: OmniPeek

This complete software offering can be installed on almost any system in the organization to capture data from the system's internal wireless card. But check the compatibility chart before ordering, as only a specific set of wireless cards are supported.

Peter Stephenson,CeRNS, May 9 2005 12:00AM Security
Review: CryptoCard

Review: CryptoCard

The CryptoCard package came with neatly and securely packaged hardware and software. The documentation was complete and very well presented, including useful screenshots. Installation was a breeze and the installation procedure very clear. We encountered no errors during installation.

Peter Stephenson,CeRNS, Feb 18 2005 12:00AM Security
Review: GemSafe Logon

Review: GemSafe Logon

GemSafe Logon is intended for the individual computer. It is self-contained, but with an administrative twist. Access policies are set up centrally by an administrator who creates a configuration file for the individual smartcards and distributes it to users. This is practical for smaller installations but perhaps not for large, distributed enterprises.

Peter Stephenson,CeRNS, Feb 11 2005 12:00AM Security
Review: PassGo Defender

Review: PassGo Defender

This is an easy two-factor system that a new administrator can implement to boost an existing system.

Peter Stephenson,CeRNS, Feb 11 2005 12:00AM Security
Review: WikID Authentication System

Review: WikID Authentication System

WikID systems has a strong offering for the medium-to-large business with this two-factor authentication system.

Peter Stephenson,CeRNS, Feb 11 2005 12:00AM Security
Review: Authenex ASAS

Review: Authenex ASAS

The Authenex ASAS system is a very robust system designed for large companies. It requires a standalone server running Windows 2000 with SP4 or Windows 2003. It must also have a Radius or SQL server on the system to allow for use of the integrated database of A-Key tokens supplied with the system.

Peter Stephenson,CeRNS, Feb 11 2005 12:00AM Security
Review: ActivCard Secure Remote Access Solution

Review: ActivCard Secure Remote Access Solution

ActivCard AAA Server has been designed for industrial or large-scale implementation. Its separate administrative console allows for delegation of multiple administrator roles if the situation calls for it. Installation of the software only requires a system large enough to hold Windows Server 2003 running as a Domain Controller.

Peter Stephenson,CeRNS, Feb 10 2005 12:00AM Security
Review: Juniper NetScreen IDP 500

Review: Juniper NetScreen IDP 500

Every now and then you find a product that has major warts but which really, under the warts, is a pretty good product. Then you wish the vendor would get its act together, because you would really like to buy and use the product.

Peter Stephenson,CeRNS, Sep 1 2004 12:00AM Security
Review: BeadWindow! 100

Review: BeadWindow! 100

This appliance has a very defined procedure for installation that must be carefully followed.
Peter Stephenson,CeRNS, Jun 28 2004 12:00AM Security
Review: Border Guard

Review: Border Guard

Border Guard and TippingPoint Unity One-200 were the best in overall practical installation and usage.
Peter Stephenson,CeRNS, Jun 28 2004 12:00AM Security
Review: CounterSnipe APD 1000

Review: CounterSnipe APD 1000

At first blush, the CounterSnipe Active Protection Device (APD) 1000 appeared to be the easiest to install and get running.
Peter Stephenson,CeRNS, Jun 28 2004 12:00AM Security
Review: ISS Proventia G200

Review: ISS Proventia G200

The installation of ISS was well documented in a manual which had a step-by-step procedure. By using the built-in text-based menus, we were able to install quickly and with assurance. This feature was unique. No other system guided us through the installation with a menu system.

Documentation was also available on CD. The steps were laid out and neatly organized. Pictures of an actual installation were included for reference and there were even instructions for rack-mounting the IPS server. The content was easy to understand and did not assume a high level of expertise.

Two quick-reference cards were provided making it easy for operators to bypass all the major settings and quickly configure a running system. For those wishing to read in detail, the complete actual manual has over 300 pages distributed among 14 chapters. Compared to the other IPS products we tested, ISS's documentation appeared to be very thorough and complete.

Technical support was not required and a test call resulted in a satisfactory response.

There were no difficulties with the basic installation of the IPS. However, it did require third-party software and hardware, specifically, a Windows 2000 Server and Microsoft SQL2000. We see no problem with the option of using an external third-party database, but believe that all required software should be supplied.

We reluctantly rank the ISS Proventia at three stars due to its requirement for third-party software and an additional server. The ISS device is not the most expensive product we tested, but its value for money rating is impacted severely by the requirement for third-party software and hardware.

Peter Stephenson,CeRNS, Jun 28 2004 12:00AM Security
Review: NetScreen IDP1000

Review: NetScreen IDP1000

NetScreen (now part of Juniper Networks) sent us the IDP 1000 to review.
Peter Stephenson,CeRNS, Jun 28 2004 12:00AM Security
Review: TippingPoint Unity One-200

Review: TippingPoint Unity One-200

Of all of the products we tested, TippingPoint Unity One-200 was the fastest and easiest to install.
Peter Stephenson,CeRNS, Jun 28 2004 12:00AM Security

Log In

  |  Forgot your password?