Peter Stephenson

Recent articles by Peter Stephenson

Review: Workshare Enterprise

Review: Workshare Enterprise

Workshare Enterprise takes the data classification aspect of security a step beyond simply classifying data. It applies classifications in the context of a collaborative environment. This is important because many collaborations include sensitive aspects and documents, and it is beneficial to limit the scope of distribution before, during and after the project's completion.
Peter Stephenson Nov 18 2013 4:06PM Security
Review: Barracuda Web Application Firewall (Model 660)

Review: Barracuda Web Application Firewall (Model 660)

Barracuda Networks is a venerable company with a rapidly growing line of security tools. Once known primarily for email security, Barracuda now provides a host of products, such as the Web Application Firewall (Model 660), a useful tool that provides protection for web applications.
Peter Stephenson Nov 18 2013 4:00PM Security
Review: BIG-IP Application Security Manager (ASM)

Review: BIG-IP Application Security Manager (ASM)

The BIG-IP 4200v with ASM from F5 is well-stocked with unique, useful features. For example, when used with F5's IP Intelligence Service, the 4200V takes advantage of IP reputation, context and categorization to analyze incoming and outgoing IP addresses.
Peter Stephenson Nov 18 2013 3:58PM Security
Review: FortiDB-1000C

Review: FortiDB-1000C

Fortinet is well-known for its products, and those we have reviewed in the past exhibited high quality response to a variety of challenges. The FortiDB-1000C did not disappoint us in this regard. It is one of a long string of Fortinet successes.
Peter Stephenson Nov 14 2013 3:14PM Security
Review: SecureSphere X1010 Web Application Firewall X1010

Review: SecureSphere X1010 Web Application Firewall X1010

Right out of the box, Imperva's SecureSphere X1010 Web Application Firewall X1010 presented a slight learning curve to get it configured, as all the documentation was not available right away. But, it can be set up with SSH and/or a console, making this step a little easier. Once the base initialization is done, the web-based user interface is user friendly with the main categories lining the top of the screen with drop-downs and subcategories after click.
Peter Stephenson Nov 14 2013 3:11PM Security
Review: SecureSphere Database Activity Monitoring (X2500)

Review: SecureSphere Database Activity Monitoring (X2500)

SecureSphere Database Activity Monitoring hardware appliance by Imperva is a well put together and configured machine that provides outstanding protection to both web and database servers.
Peter Stephenson Nov 14 2013 3:08PM Security
Review: McAfee Database Security Solution

Review: McAfee Database Security Solution

The McAfee Database Security Solution software is a solid buy for any enterprise. It includes McAfee Vulnerability Manager for Databases, McAfee Database Activity Monitoring and McAfee Virtual Patching for Database. It comes with plenty of documentation, a solid user interface and all is easy to install and implement.
Peter Stephenson Nov 14 2013 3:03PM Security
Review: Avatier Identity Management Suite (AIMS) v9

Review: Avatier Identity Management Suite (AIMS) v9

AIMS provides a complete set of identity management (IdM), network access control (NAC) and data leakage prevention (DLP) features.
Peter Stephenson Oct 9 2013 4:33PM Security
Review: Bradford Networks Network Sentry v6.1

Review: Bradford Networks Network Sentry v6.1

Network Sentry is delivered through an appliance, virtual server or cloud service (for this evaluation, Bradford provided a hardware appliance).
Peter Stephenson Oct 9 2013 4:31PM Security
Review: Centrify Suite 2013.2 Platinum Edition

Review: Centrify Suite 2013.2 Platinum Edition

Centrify Suite 2013.2 Platinum Edition includes features such as DirectControl, DirectAuthorize, DirectAudit and DirectSecure. By leveraging an existing infrastructure enterprise (such as Microsoft Active Directory), these provide central control and securing and auditing of user access through cross-platform systems, mobile devices and applications.
Peter Stephenson Oct 9 2013 4:29PM Security
Review: Code Green Networks TrueDLP v8.1

Review: Code Green Networks TrueDLP v8.1

TrueDLP is delivered via Code Green Networks' Content Inspection (CI) Appliances. The CI Appliances have dedicated network interfaces for inspecting network traffic. Traffic is inspected for sensitive data (keywords, phrases, file types, structured data) regardless of port, protocol or file type.
Peter Stephenson Oct 8 2013 3:15PM Security
Review: Fischer International Identity Fischer Identity v5.2

Review: Fischer International Identity Fischer Identity v5.2

The Fischer International Identity solution is a set of high-availability Java applications for SaaS (software-as-a-service) and on-premise, running on open source or commercial off-the-shelf (COTS) platforms (OS, DB, directory, etc.).
Peter Stephenson Oct 8 2013 3:12PM Security
Review: ForeScout CounterACT v7.1

Review: ForeScout CounterACT v7.1

ForeScout CounterACT offers an enterprise-class NAC platform that assures network access based on real-time endpoint classification, configuration assessment, user and endpoint compliance policy and automated response.
Peter Stephenson Oct 8 2013 2:58PM Security
Review: Hitachi ID Management Suite v8.2.1

Review: Hitachi ID Management Suite v8.2.1

The Hitachi ID Management Suite v8.2.1 contains several identity management components that are well integrated to form a fairly comprehensive suite. The package includes Hitachi ID Identity Manager, which features tools to automate user access to resources; Password Manager, which allows for password synchronization across the enterprise; and Privileged Access Manager, which manages access to privileged accounts; along with added functionality from Group Manager and Access Certification.
Peter Stephenson Oct 8 2013 2:57PM Security
Review: Lieberman Software Enterprise Random Password Manager v4.83.6

Review: Lieberman Software Enterprise Random Password Manager v4.83.6

The Enterprise Random Password Manager (ERPM) from Lieberman Software is more than just a random password generator. This product allows for full management of enterprise privileged accounts, ensuring that all accounts are secured with a unique and complex password. This product can automate discovery, monitoring and auditing of administrator or super-user accounts, service accounts and application-to-application passwords. Once setup, ERPM can be set to be fully automated, which eliminates the need to manually track and change privileged account passwords throughout the environment at regular intervals.
Peter Stephenson Oct 3 2013 3:25PM Security
Review: NetIQ Identity Manager v4.0.2

Review: NetIQ Identity Manager v4.0.2

Identity Manager from NetIQ provides tools for managing the entire user identity lifecycle - from on-boarding through deletion and everything in-between. This product helps administrators automate user identity provisioning and access management, ensuring all users have one identity across all the platforms throughout the enterprise environment. This provisioning extends across not only the physical network, but also to virtual networks and cloud systems.
Peter Stephenson Oct 3 2013 3:23PM Security
Review: Pleasant Solutions Pleasant Password Server v4.1.7

Review: Pleasant Solutions Pleasant Password Server v4.1.7

The Pleasant Password Server from Pleasant Solutions provides a way to add central management capabilities to the KeePass Password Safe, a free, open source password manager. This allows administrators to keep user Password Safe data stores secure and encrypted in-house without having to use the cloud or have users manage their own Password Safe. Users can use the Password Safe to store passwords, PINs, credit card numbers, license keys and any other sensitive data. With this product deployed, users can easily access their Password Safe via a KeePass client application or through an intuitive web interface that only requires a web browser and an internet connection.
Peter Stephenson Oct 3 2013 3:21PM Security
Review: Axway MailGate SC

Review: Axway MailGate SC

Axway MailGate SCThe MailGate SC from Axway incorporates email security with safeguard collaboration functions. It can provide full email security - including protection from inbound spam and viruses; outbound content management, including regulatory compliance policy management; and email encryption options, as well as additional secure file-sharing through its integrated DropZone Secure Collaboration feature. DropZone can be used by employees to securely share files both internally and externally without having to use other cloud-based file-sharing platforms.
Peter Stephenson Sep 11 2013 11:41AM Security
Review: Barracuda Spam and Virus Firewall

Review: Barracuda Spam and Virus Firewall

The Spam and Virus Firewall from Barracuda Networks provides solid inbound and outbound email security functionality through a feature-rich appliance.
Peter Stephenson Sep 10 2013 4:57PM Security
Review: Cisco Email Security

Review: Cisco Email Security

The Cisco Email Security virtual appliance offers a full set of inbound and outbound email security and control features.
Peter Stephenson Sep 10 2013 4:54PM Security

Log In

  |  Forgot your password?