Jon Tullett

Recent articles by Jon Tullett

Review: ReadyARM

Review: ReadyARM

Avanton’s ReadyARM is an IDS appliance aimed at SMEs. It is based on open-source IDS and vulnerability-scanning software and has custom wrappers to hold it together, a web GUI and prepackaged reports.
Jon Tullett Feb 1 2006 12:00AM Security
Review: LocalSSL Internet

Review: LocalSSL Internet

Whatever your network and application security, keyloggers can deal a mortal blow to corporate security. Popular with rootkits and trojans, loggers capture keystrokes, revealing passwords, personal information and entire documents before anything can be encrypted or locked down in any other way.
Jon Tullett Jan 1 2006 12:00AM Security
Review: XSGuard X-Series

Review: XSGuard X-Series

The last time we tested XSGuard’s IPS appliance, we could not complete the test due to internet connection difficulties (SC, July 2005, p58). This time, we used a similar methodology as in the earlier test, but went into more detail.
Jon Tullett Nov 1 2005 12:00AM Security
Review: DESlock+

Review: DESlock+

This product, now at version 3.2 after an overall clean-up and the addition of new features, is a desktop encryption system using either software key repositories or hardware tokens.
Jon Tullett Nov 1 2005 12:00AM Security
Review: AEP Netilla Security Platform B-Class

Review: AEP Netilla Security Platform B-Class

We were interested to see how the AEP Netilla Security Platform would shape up, following this year's merger of AEP and Netilla.

Jon Tullett Oct 3 2005 12:00AM Security
Review: Array SPX 5000

Review: Array SPX 5000

Array’s SPX5000 is a fully-featured appliance, with a superb set of VPN features. But it took some time to establish that, as the setup process was challenging. It started with a CLI network setup, complete with out-of-date documentation.

Jon Tullett Oct 3 2005 12:00AM Security
Review: Aventail Smart SSL VPN

Review: Aventail Smart SSL VPN

Aventail has one of the best-organized web management GUIs we have used. A startup wizard got us going via the console port, although there was a brief delay when the documentation left the ‘s’ out of https, leaving us unable to connect.
Jon Tullett Oct 3 2005 12:00AM Security
Review: Base5

Review: Base5

Permeo’s Base5 is a RedHat-based solution that turns a standard server into an SSL VPN. Obviously, this means you need to supply your own server, and you will need to check the hardware support – our first attempt to install the software crashed anaconda (RedHat’s installer) in its usual ugly way.
Jon Tullett Oct 3 2005 12:00AM Security
Review: Nokia Secure Access System

Review: Nokia Secure Access System

This is not actually an SSL VPN, but a network security platform (IP300) on which you can then run other services – like an SSL VPN.
Jon Tullett Oct 3 2005 12:00AM Security
Review: PortWise SSL VPN

Review: PortWise SSL VPN

PortWise 4.0 is a software solution, although we received it preconfigured on a Sun V20z running RedHat ES. We might have been better off setting it up ourselves: we had to log in to a root shell to get the network configured, and while the documentation is great for setting up actual SSL VPN services, it was not much use at the outset.
Jon Tullett Oct 3 2005 12:00AM Security
Review: StorageSafe

Review: StorageSafe

StorageSafe is another offering in the removable-device security space. There are many products rubbing shoulders in this area, and the basics are pretty well covered. StorageSafe is not aimed at high-end environments, with key distribution and management features, but at quick and basic everyday data protection, which it does well.

Jon Tullett Aug 25 2005 12:00AM Security
Review: Nsauditor

Review: Nsauditor

Nsauditor (Network Security Auditor) is a Windows-based multi-purpose tool designed to scan networks and hosts for vulnerabilities, and to provide security alerts.

Jon Tullett Aug 25 2005 12:00AM Security
Review: DeadMan’s Handle

Review: DeadMan’s Handle

DeadmanMan's Handle is a data security product that is simple in concept – if an unauthorized user attempts to use the machine, it deletes any sensitive files.

Jon Tullett Jul 27 2005 12:00AM Security
Review: East-Tec Eraser 2005

Review: East-Tec Eraser 2005

East-Tec Eraser 2005 is a dual-purpose product, combining secure file deletion with clean-up tools to erase traces from PCs.

Jon Tullett Jul 22 2005 12:00AM Security
Review: EnCase Forensic

Review: EnCase Forensic

Guidance Software's EnCase product is the undisputed heavyweight of the forensic software market, and version 5.0 introduces a slew of new features that will keep its opposition firmly on the ropes.

Jon Tullett Jul 21 2005 12:00AM Security
Review: Forensic Field Kit

Review: Forensic Field Kit

WiebeTech's forensic kits tackle two very specific points of pain for forensic investigators: conducting field acquisition and transporting data safely (to prevent damage and ensure the chain of evidence is unchallengeable).

Jon Tullett Jul 21 2005 12:00AM Security
Review: Inforenz Forager

Review: Inforenz Forager

This tool is designed to help search file systems during forensic examinations. It collects information and meta data associated with files, and offers strong searching and indexing capabilities, although limited to Windows file systems.

Jon Tullett Jul 21 2005 12:00AM Security
Review: NetWitness Appliance

Review: NetWitness Appliance

NetWitness is a network forensics and analysis package available in both software and appliance (really just a preconfigured server) formats.

Jon Tullett Jul 21 2005 12:00AM Security
Review: ProDiscover Incident Response

Review: ProDiscover Incident Response

This product is the big brother of its family, including all the forensic capabilities of other versions with the additional ability to conduct investigations over the network and compare live systems to known-good baselines to establish whether a machine has been compromised or tampered with.

Jon Tullett Jul 21 2005 12:00AM Security
Review: Stellar Phoenix FAT & NTFS

Review: Stellar Phoenix FAT & NTFS

Stellar Phoenix is a product aimed at data recovery, rather than strict forensics, although of course recovery is an important part of incident response. Confronted with a disk with damaged or missing data, the software will attempt to recover information and reconstruct partial data.

Jon Tullett Jul 21 2005 12:00AM Security

Log In

  |  Forgot your password?