Peter Stephenson

Recent articles by Peter Stephenson

Review: SafeNet Authentication Service

Review: SafeNet Authentication Service

The SafeNet Authentication Service offers an entirely cloud-based multi-factor authentication platform for the enterprise.
Peter Stephenson Apr 23 2013 3:03PM Security
Review:  SecureAuth IdP

Review: SecureAuth IdP

SecureAuth IdP combines a multitude of authentication and identity management features. It can be installed as an on-premise or cloud-based deployment for managing single sign-on and two-factor authentication for many facets of the enterprise infrastructure.
Peter Stephenson Apr 23 2013 2:12PM Security
Review: Swivel Appliance

Review: Swivel Appliance

The Swivel Appliance from Swivel Secure is driven by PINsafe technology that allows users to combine PINs with randomly generated security strings to provide robust strong authentication.
Peter Stephenson Apr 23 2013 1:57PM Security
Review: Digipass Go 7 and Identikey Authentication Server

Review: Digipass Go 7 and Identikey Authentication Server

Vasco pairs together its Digipass Go 7 and Identikey Authentication Server to provide solid out-of-the-box strong authentication to many applications throughout the enterprise environment. It can easily integrate with existing authentication stores in the enterprise to provide seamless two-factor authentication to web-based and cloud-based applications. It can also add two-factor authentication to VPN and Radius deployments providing an excellent amount of flexibility in integration.
Peter Stephenson Apr 23 2013 1:54PM Security
Review:  TeleSign 2FA

Review: TeleSign 2FA

TeleSign 2FA is a full API and SDK that allows an enterprise to integrate two-factor authentication into its existing web applications. It allows administrators to modify their existing web applications to include a drop-down box on the authentication screen from which a user can choose the way of receiving their one-time passcode. Passcodes can be sent to the user either via SMS text message or by phone to a number that has been previously registered. This provides full out-of-band two-factor authentication without the need to purchase additional tokens.
Peter Stephenson Apr 23 2013 1:51PM Security
Review: Big-IP Application Security Manager

Review: Big-IP Application Security Manager

Although primarily known for top-shelf networking products, F5 Networks' offering in the application security space is no afterthought. Available as a standalone appliance or module for one of its network products, the BIG-IP Application Security Manager (ASM) functions as a firewall, protecting web applications and services with a powerful policy engine.
Peter Stephenson Apr 23 2013 12:25PM Security
Review:  ForeScout CounterAct v7.0

Review: ForeScout CounterAct v7.0

ForeScout CounterAct offers enterprise-class NAC, assuring network access based on real-time endpoint classification configuration assessment, user and endpoint compliance policy and automated response. The system provides a multifactored approach to identify and classifies all devices, systems, applications and users, assesses adherence to configuration and security policy, and determines if access to resources should be allowed, denied or limited.
Peter Stephenson Apr 23 2013 12:21PM Security
Review:  SecureSphere Business Security Suite

Review: SecureSphere Business Security Suite

With large enterprise networks under constant attack from malicious entities, administrators need powerful defences. Imperva makes its appearance in this field to help hold attackers at bay. Just prepare your chequebook - this product doesn't come cheap.
Peter Stephenson Apr 23 2013 12:18PM Security
Review:  Trend Micro InterScan Messaging Security

Review: Trend Micro InterScan Messaging Security

On paper, InterScan Messaging Security from Trend Micro is a wonderful product. Combining on-premise software with an optional cloud-based pre-filter, the tool provides a flexible approach to email security. If we would have been able to get it working, we would probably be impressed.
Peter Stephenson Apr 23 2013 12:14PM Security
Review: Thycotic Software Secret Server, Password Reset Server and Group Management Server

Review: Thycotic Software Secret Server, Password Reset Server and Group Management Server

Here we have three products from Thycotic Software that when combined provide a reasonably comprehensive identity management suite.
Peter Stephenson Oct 4 2012 3:09PM Security
Review: StillSecure Safe Access

Review: StillSecure Safe Access

Safe Access from StillSecure offers a full network access control system that includes functionality for ensuring endpoints on the network meet policy and compliance standards before being able to join the network and access network resources.
Peter Stephenson Oct 4 2012 3:06PM Security
Review: Softerra Adaxes

Review: Softerra Adaxes

Adaxes from Softerra enables the ability to automate user provisioning and deprovisioning by interfacing directly with Microsoft Active Directory.
Peter Stephenson Oct 4 2012 3:03PM Security
Review: Quest One Identity Manager with ActiveRoles Server

Review: Quest One Identity Manager with ActiveRoles Server

Quest One Identity Manager with ActiveRoles Server provides a wide array of identity management features and functions.
Peter Stephenson Oct 4 2012 3:01PM Security
Review: Lieberman Software Enterprise Random Password Manager

Review: Lieberman Software Enterprise Random Password Manager

Lieberman Software really delivered on this. Its Enterprise Random Password Manager (ERPM) addresses the management of privileged access across enterprise resources.
Peter Stephenson Oct 4 2012 2:42PM Security
Review: McAfee Cloud Identity Manager

Review: McAfee Cloud Identity Manager

The Cloud Identity Manager from McAfee helps administrators provide single sign-on and account provisioning for cloud-based applications.
Peter Stephenson Oct 4 2012 2:38PM Security
Review: NetIQ Identity Manager

Review: NetIQ Identity Manager

Identity Manager from NetIQ is a full identity and user management platform that allows administrators to manage users across physical, virtual and cloud-based environments.
Peter Stephenson Oct 4 2012 2:36PM Security
Review: Hitachi ID Systems Hitachi ID Management Suite v8.0

Review: Hitachi ID Systems Hitachi ID Management Suite v8.0

The Hitachi ID Management Suite is primarily made up of three modules: Hitachi ID Identity Manager, which helps manage identities and provisioning across multiple systems and applications; Hitachi ID Password Manager; and Hitachi ID Privileged Access Manager.
Peter Stephenson Oct 4 2012 2:33PM Security
Review: ForeScout Technologies ForeScout CounterACT v7.0

Review: ForeScout Technologies ForeScout CounterACT v7.0

ForeScout CounterACT offers an enterprise-class NAC, assuring network access based on real-time endpoint classification configuration assessment, user and endpoint compliance policy and automated response.
Peter Stephenson Oct 4 2012 2:29PM Security
Review: Fischer International Fischer Identity v5.0

Review: Fischer International Fischer Identity v5.0

The Fischer solution is postured to help organizations drive (not react to) their identity management solutions.
Peter Stephenson Oct 4 2012 2:25PM Security
Review: Code Green Networks CI-750 Content Inspection Appliance v8.0

Review: Code Green Networks CI-750 Content Inspection Appliance v8.0

The CI-750 provides real-time content inspection allowing customers to protect against data loss across the network.
Peter Stephenson Oct 4 2012 2:22PM Security

Log In

  |  Forgot your password?