Features

Review: Panda Virtual GateDefender Performa

Review: Panda Virtual GateDefender Performa

Businesses can cut costs by virtualising their security appliances, and Panda's latest Virtual GateDefender Performa (VGP) looks to offer some big savings.
John Jul 31 2012 11:21AM Security
Review: FortiGate 111C

Review: FortiGate 111C

Aimed at SMEs and remote office deployments, Fortinet's FortiGate 111C offers a range of security measures that defies belief. Another benefit is that all features are developed by Fortinet, so it doesn't rely on any third-party services.
John Jul 31 2012 11:15AM Security
Review: Check Point 2210 Appliance

Review: Check Point 2210 Appliance

Check Point's new 2200 Appliance family is designed for SMEs that want affordable enterprise-level network security.
John Jul 31 2012 11:09AM Security
Review: M86 Secure Web Gateway v10.1

Review: M86 Secure Web Gateway v10.1

M86 Secure Web Gateway (SWG) v10.1 proactively safeguards against malware and Web 2.0 threats using patented real-time code analysis, dynamic web repair technology and granular social media controls.
Michael Lipinski Jul 31 2012 11:06AM Security
Review: Rapid7 Nexpose Enterprise Edition

Review: Rapid7 Nexpose Enterprise Edition

The Nexpose Enterprise Edition from Rapid7 is another tool that has grown into a vastly different product over the years. This latest version, we believe, is the best yet.
Peter Stephenson Jul 31 2012 11:03AM Security
Review: Cyberoam CR1000ia

Review: Cyberoam CR1000ia

The Cyberoam CR1000ia is a full-feature network security gateway that provides solid protection from a multitude of threats.
Peter Stephenson Jul 31 2012 10:57AM Security
Review: RSA NetWitness

Review: RSA NetWitness

RSA NetWitness is a network-monitoring system designed to handle a wide range of information. NetWitness comes in three parts: a Concentrator (a Linux-based network appliance), Decoder (a configurable network-recording appliance) and Investigator (an interactive threat analysis application).
Peter Stephenson Jul 31 2012 10:52AM Security
Review: Symantec Control Compliance Suite v11

Review: Symantec Control Compliance Suite v11

The Control Compliance Suite enables enterprises to define security and compliance-related policies.
Peter Stephenson Jul 31 2012 10:47AM Security
IPv6 co-founder talks protocol security

IPv6 co-founder talks protocol security

Security practitioners need to learn the basics of IPv6.
Robert Hinden Jul 27 2012 12:02PM Security
Review: CloudPassage Halo

Review: CloudPassage Halo

Cloud systems usually are little more than virtual data centers on the internet.
Peter Stephenson Jul 26 2012 4:11PM Security
Review: MetaFlows Security System

Review: MetaFlows Security System

This is a killer app. The more we watched this one sort through the data that it was monitoring - over a million events and flows at a major university - and dig down and analyze it, the more we wanted one.
Peter Stephenson Jul 26 2012 4:06PM Security
Review: nCircle PureCloud

Review: nCircle PureCloud

We have looked at nCircle products before and we liked them a lot.
Peter Stephenson Jul 26 2012 3:58PM Security
Review: CipherCloud for Salesforce

Review: CipherCloud for Salesforce

Today, this product focuses on the Salesforce application, but it is well-positioned to apply to any cloud-based application.
Peter Stephenson Jul 26 2012 3:55PM Security
Review: Echoworx Security Cloud

Review: Echoworx Security Cloud

This is an interesting product. It is interesting both for what it does and what it doesn't do. What it does is manage credentialing throughout the enterprise, virtual or physical. It keeps credentials on the endpoints and encrypts there. It supports just about any platform one can think of.
Peter Stephenson Jul 26 2012 3:50PM Security
Review: KoolSpan TrustCall and TrustChip

Review: KoolSpan TrustCall and TrustChip

This one is a point solution to a point problem: voice call security from mobile phones. In addition, however, it has optional modules that secure text and email. We will focus on the voice capabilities for this review. The KoolSpan system includes the TrustCall software for the mobile phone, the TrustChip, also for the phone, and the TrustRelay Server (not covered in this review).
Peter Stephenson Jul 26 2012 3:43PM Security
Review: Sophos Mobile Control

Review: Sophos Mobile Control

Security solutions vendor Sophos is one of the newer players in the mobile device management market, yet has successfully created a full-featured offering that combines capabilities with ease of use. Sophos Mobile Control works with iPhone, iPad, Android, BlackBerry and Windows mobile devices.
Peter Stephenson Jul 26 2012 3:37PM Security
Review: AirWatch

Review: AirWatch

AirWatch tackles the mobile device management conundrum head on with an integrated approach that keeps devices secure, while protecting enterprise resources from compromise. The company's claim to fame comes in the form of its laser sharp focus on mobile device security, which takes a holistic approach to assigning, controlling and securing a variety of portable devices.
Peter Stephenson Jul 26 2012 3:33PM Security
Review: Good Technology Good for Enterprise

Review: Good Technology Good for Enterprise

Mobile device security vendor Good Technology, which Gartner Research placed in its Leaders Quadrant in its annual "MDM Magic Quadrant," enables consumers and enterprise users to say good riddance to the security problems surrounding today's multitude of mobile devices, a problem that only seems to be growing as more and more end-users bring iPhones, Andriod devices, iPads and countless other handhelds into the enterprise.
Peter Stephenson Jul 26 2012 2:49PM Security
Review: M.A.D. Mobile Enterprise Compliance and Security Server

Review: M.A.D. Mobile Enterprise Compliance and Security Server

The Mobile Enterprise Compliance and Security Server, or MECS Server, from Mobile Active Defense (M.A.D.) offers a full suite of tools for mobile device security.
Peter Stephenson Jul 26 2012 2:36PM Security
Review: Fixmo SafeZone

Review: Fixmo SafeZone

SafeZone from Fixmo takes an interesting approach to mobile device security and management.
Peter Stephenson Jul 26 2012 2:32PM Security

Log In

  |  Forgot your password?