Peter Stephenson

Recent articles by Peter Stephenson

Review: McAfee Total Protection for Compliance v7.x

Review: McAfee Total Protection for Compliance v7.x

McAfee Total Protection (ToPS) for Compliance reduces remediation time from months to days by providing unique, countermeasure-aware, impact/risk assessment capabilities.
Peter Stephenson Jun 14 2013 5:11PM Security
Review: Modulo Risk Manager v8.1

Review: Modulo Risk Manager v8.1

Strong all around, from risk process, usability, level of integration, reporting and delivery of the content in a usable format.
Peter Stephenson Jun 14 2013 5:09PM Security
Review: NetIQ Secure Configuration Manager v5.9

Review: NetIQ Secure Configuration Manager v5.9

Secure Configuration Manager from NetIQ provides a feature-rich platform for monitoring and ensuring policy compliance throughout the network environment.
Peter Stephenson Jun 14 2013 5:06PM Security
Review: New Net Technologies Change Tracker Enterprise

Review: New Net Technologies Change Tracker Enterprise

Change Tracker Enterprise from New Net Technologies offers full change and policy compliance management and monitoring.
Peter Stephenson Jun 14 2013 5:03PM Security
Review: Promisec Endpoint Manager

Review: Promisec Endpoint Manager

Promisec Endpoint Manager is a full-scale policy and endpoint management platform that allows administrators to inspect, monitor and enforce configuration and compliance policy across the entire IT environment from one easy-to-manage console. With this product, administrators can define a policy for Microsoft Windows, Linux, Unix, Mac and Android devices on the network, and ensure that compliance to the security policy is adhered to.
Peter Stephenson Jun 14 2013 5:00PM Security
Review: RedSeal 6 Platform v6.6

Review: RedSeal 6 Platform v6.6

RedSeal 6 Platform is a risk-based IT security management platform that enables organizations to identify, prioritize and respond to critical points of weakness in complex enterprise security control infrastructure.
Peter Stephenson Jun 14 2013 4:57PM Security
Review: RSA Archer GRC Platform 5.3 SP1

Review: RSA Archer GRC Platform 5.3 SP1

RSA Archer's Risk Manager is part of an enterprise GRC product portfolio sold and licensed as modules: audit, policy, risk, compliance, enterprise, incident, vendor, threat and business continuity management.
Peter Stephenson Jun 14 2013 10:54AM Security
Review: Rsam GRC v8

Review: Rsam GRC v8

Rsam GRC v8 is a platform for risk management and security risk intelligence enabling organizations to perform risk assessments, manage compliance, threats and vulnerabilities, policies, remediation activities, issues, incidents and more.
Peter Stephenson Jun 14 2013 10:51AM Security
Review: Skybox View Enterprise Suite v6.5

Review: Skybox View Enterprise Suite v6.5

Skybox View Enterprise Suite v6.5 is a complete portfolio of proactive security risk management solutions that automatically find and prioritize risks and drive remediation.
Peter Stephenson Jun 14 2013 10:46AM Security
Review: SolarWinds Patch Manager and Firewall Security Manager

Review: SolarWinds Patch Manager and Firewall Security Manager

Patch Manager and Firewall Security Manager from SolarWinds are two products that can be used together by administrators and security professionals to achieve a full picture of system patch policy and firewall policy auditing.
Peter Stephenson Jun 14 2013 10:39AM Security
Review: Symantec Control Compliance Suite v11

Review: Symantec Control Compliance Suite v11

Symantec Control Compliance Suite (CCS) automates key IT risk and compliance management tasks. It is an integrated solution comprising several different modules, including vulnerability, security, risk, policy, assessment and vendor risk management.
Peter Stephenson Jun 14 2013 9:57AM Security
Review: Tripwire Enterprise and DataMart

Review: Tripwire Enterprise and DataMart

Tripwire Enterprise and DataMart are two products that compose a suite for maintaining configuration states of servers, network devices and databases, as well as robust reporting services, to allow for deeper analysis of security and configuration policy.
Peter Stephenson May 22 2013 11:48AM Security
Review: AccessData Forensic Suite

Review: AccessData Forensic Suite

There are three products in AccessData's forensic suite that every digital forensic investigator needs: Mobile Phone Examiner (MPE) Plus, Forensic Toolkit (FTK) and AD Triage. The compatibility of the three tools enables the user to complete a thorough and organized investigation.
Peter Stephenson May 15 2013 12:05PM Security
Review: ADF Solutions Triage-G2

Review: ADF Solutions Triage-G2

ADF Solutions' Triage-G2 Pro was quick to set up and use. All we had to do was download the software, configure the triage key so it knew what to collect, plug the key into the targeted device, and then analyze the information.
Peter Stephenson May 15 2013 12:02PM Security
Review: Cellebrite UFED Touch Ultimate

Review: Cellebrite UFED Touch Ultimate

The Cellebrite UFED Touch Ultimate is a fully equipped mobile forensic tool that enables quick and easy data acquisition from more than 8,000 mobile devices, including not only cellphones, but handheld GPS units, tablets and other mobile platforms.
Peter Stephenson May 15 2013 10:51AM Security
Review: Cyber Security Technologies Mac Marshal

Review: Cyber Security Technologies Mac Marshal

Both Mac Marshal Forensic Edition and Field Edition provide user-friendly forensic tool kits. Each allows users to access a computer with ease and flexibility. While these offerings were designed originally for Mac OS X to access data, logs and virtual machines running within the Mac OS, the Forensic Edition for PCs will also work with MS Windows.
Peter Stephenson May 15 2013 10:48AM Security
Review: Guidance Software EnCase Forensic v7

Review: Guidance Software EnCase Forensic v7

Encase Forensic v7 is a tool for computer investigation that both searches a computer system for information, as well as aids in the process of developing this information into a complete report. This software can decrypt high-level forms of encryption, create an image of the physical drive, and then generate reports on the evidence.
Peter Stephenson May 15 2013 10:45AM Security
Review: HBGary Responder Professional

Review: HBGary Responder Professional

HBGary's Responder Professional is a Windows memory acquisition and analysis tool that offers a variety of features useful to malware analysts and computer forensic investigators.
Peter Stephenson May 14 2013 5:10PM Security
Review: IntaForensics Lima Forensic Case Management Software

Review: IntaForensics Lima Forensic Case Management Software

Lima Forensic Case Management Software from IntaForensics is a complete, end-to-end case management system that offers an easy way to organize every aspect of a digital forensic investigation.
Peter Stephenson May 14 2013 5:05PM Security
Review: NIKSUN NetDetector/NetVCR Alpine 4.2.1

Review: NIKSUN NetDetector/NetVCR Alpine 4.2.1

The NIKSUN NetDetector/NetVCR Alpine 4.2.1 is a network security monitoring tool with advanced forensic analytical capabilities.
Peter Stephenson May 14 2013 5:03PM Security

Log In

  |  Forgot your password?