Features

Review: Sophos UTM 220

Review: Sophos UTM 220

Perhaps best known for its anti-virus products, Sophos has produced a stellar UTM with its 220. Targeting small to mid-sized offices with up to 150 users, it combines standard UTM offerings with a few features we did not expect, making it something definitely worth looking at.
Peter Stephenson May 7 2013 10:47AM Security
Review: aXsGuard Gatekeeper

Review: aXsGuard Gatekeeper

Administrators of smaller environments on a fixed budget could do very well by the aXsGuard Gatekeeper by Vasco. While a little more complicated to use than some of the more expensive products, a little attention to detail and the device performs well.
Peter Stephenson May 7 2013 10:45AM Security
Review: WatchGuard XTM 830

Review: WatchGuard XTM 830

While best known for its firewalls, WatchGuard is no slouch in the UTM space. As we detail below, its XTM 830, while somewhat pricey, provides an excellent enterprise-grade perimeter defence against viruses, spam and other unwelcome traffic - and includes a number of other features all in one easy-to-administer device.
Peter Stephenson May 7 2013 10:42AM Security
Review: Wedge 1005G Anti-malware Gateway

Review: Wedge 1005G Anti-malware Gateway

Wedge 1005G Anti-malware Gateway looks good on paper, but in reality is a little disappointing. While the initial setup was easy enough, ease-of-use issues and documentation gaps made for a frustrating deployment experience.
Peter Stephenson May 3 2013 12:16PM Security
Review: Bitdefender GravityZone

Review: Bitdefender GravityZone

This sounds a bit like one of those inflatable toys at local fairs inside of which children bounce around, or perhaps some science fiction environment that surrounds a planet. Actually, although it is neither, it has some similar characteristics.
Peter Stephenson May 3 2013 12:13PM Security
Review: McAfee Move Anti-Virus

Review: McAfee Move Anti-Virus

Anti-malware today suffers from a frustrating dichotomy. First, it is, arguably, the most mature of all of the capabilities in the security practitioner's toolkit.
Peter Stephenson May 2 2013 5:42PM Security
Review: Reflex Virtualization Management Center

Review: Reflex Virtualization Management Center

This is one of those products that one would think is a no-brainer. Virtualised data centres can get very large and complicated and managing it is a challenge.
Peter Stephenson May 2 2013 5:34PM Security
Review: Symantec Critical System Protection

Review: Symantec Critical System Protection

The notion of wrappers has been with us for a long time. Back in the early days of Unix and Linux, we used wrappers to provide security to not-so-secure applications, such as telnet. Today that concept has matured and we see it popping up in modern apps. Symantec CSP is a good example. One might characterise CSP as a security wrapper for mission-critical environments. That means that if it is a crucial piece of the computing infrastructure - such as a Scada system or a medical device controller - it gets the security protection it needs.
Peter Stephenson May 2 2013 2:08PM Security
Review: Nexpose v 5.5

Review: Nexpose v 5.5

Rapid7's Nexpose assists clients through the entire vulnerability management lifecycle - spanning discovery, vulnerability detection, risk classification, impact analysis, reporting, vulnerability verification and risk mitigation. Organisations can use it to gain insight into their security posture and IT environment.
Peter Stephenson May 2 2013 12:38PM Security
Review: GFI LanGuard 2012

Review: GFI LanGuard 2012

GFI LanGuard 2012 offers a full set of vulnerability scanning and management features. It brings together vulnerability scanning, remediation and patch management, as well as network and software auditing, all under one roof. LanGuard is software-based and can be installed on almost any Microsoft Windows machine in the enterprise environment and can scan Windows, Linux/Unix and Mac OS targets on the network.
Peter Stephenson May 2 2013 12:18PM Security
Review: Core Impact Professional

Review: Core Impact Professional

The people at Core Security are at it again. We found this version of the product to contain more automation, more wizards and more options than previous versions we have tested. For those that are unfamiliar with this tool, Core Impact is quickly becoming the standard in penetration testing and vulnerability scanning. It features many types of penetration tests, including network-based and remote host-based, as well as many other tools, including Wi-Fi network and web-based penetration tests.
Peter Stephenson May 2 2013 12:16PM Security
Review: Critical Watch FusionVM

Review: Critical Watch FusionVM

FusionVM from Critical Watch offers both vulnerability management and configuration policy auditing in either a physical or virtual appliance or as a full, cloud-based SaaS option. If the SaaS option is chosen, customers can receive external scanning without any additional hardware or software needed. If scanning internally, the customer must install an appliance that connects to the cloud service for scanning.
Peter Stephenson May 2 2013 12:14PM Security
Review: ManageEngine Security Manager Plus v5.5

Review: ManageEngine Security Manager Plus v5.5

ManageEngine Security Manager Plus (Professional Edition) is a network security scanner that proactively reports on network vulnerabilities and helps to remediate them and ensure compliance. With vulnerability scanning, open ports detection, patch management, Windows file/folder/registry change management and vulnerability reporting capabilities, the tool protects the network from security threats and malicious attacks.
Peter Stephenson May 2 2013 12:12PM Security
Review: NetVigilance Internal Scan - Cloud

Review: NetVigilance Internal Scan - Cloud

Internal Scan - Cloud edition from netVigilance offers a full cloud-based vulnerability scanning engine that can scan both internal and external systems for vulnerabilities and compliance. This solution is based entirely in the cloud, so there is no need for the purchase of any additional hardware. All that is required is the installation of the scanning agent on a Microsoft Windows-based machine somewhere on the internal network.
Peter Stephenson May 2 2013 12:10PM Security
Review:  QualysGuard Vulnerability Management v7.6

Review: QualysGuard Vulnerability Management v7.6

QualysGuard Vulnerability Management (VM) provides automated auditing and vulnerability management for small to large enterprises. It is a private cloud-based software-as-a-service.
Peter Stephenson May 2 2013 12:08PM Security
Review: Retina CS

Review: Retina CS

Retina CS from BeyondTrust offers up quite a few strong features for vulnerability management throughout the enterprise. This solution provides discovery and remediation of security risks and vulnerabilities based on priority and severity. It offers the usual vulnerability scanning and assessment functions, but takes this a step further by adding context to those vulnerabilities, which brings in some risk management functionality alongside that of vulnerability management.
Peter Stephenson May 2 2013 12:04PM Security
Review: Saintmanager/Saintscanner/Saintexploit v7.14

Review: Saintmanager/Saintscanner/Saintexploit v7.14

From the same graphical user interface, Saint provides an integrated solution for vulnerability scanning, configuration compliance testing, penetration testing, canned reporting and custom report creation.
Peter Stephenson May 2 2013 11:59AM Security
Review: Secunia VIM v4.0

Review: Secunia VIM v4.0

Secunia VIM is a real-time vulnerability intelligence and management tool, providing organisations with the necessary information required to analyse vulnerabilities in their IT infrastructure, as well as track them from a centralised dashboard interface.
Peter Stephenson May 2 2013 11:55AM Security
Review: Samsung Galaxy S4 smartphone

Review: Samsung Galaxy S4 smartphone

Formidably fast four-core phone.
Juha Saarinen Apr 30 2013 6:19AM Telco/ISP
Review: SecurityCenter Continuous View v4.6

Review: SecurityCenter Continuous View v4.6

SecurityCenter Continuous View (SC-CV) from Tenable Network Security provides real-time vulnerability management, capturing security and compliance risks introduced by mobile, cloud and virtual infrastructure.
Peter Stephenson Apr 24 2013 1:56PM Security

Log In

  |  Forgot your password?