Features

Review: Cyber Security Technologies Mac Marshal Field Edition

Review: Cyber Security Technologies Mac Marshal Field Edition

Mac Marshal Field Edition from Cyber Security Technologies is a USB tool that allows users to perform a first-level forensic analysis on any Mac or PC computer.
Staff Writers Aug 1 2012 2:34PM Security
Review: Cellebrite UFED Ultimate

Review: Cellebrite UFED Ultimate

Cellebrite UFED Ultimate is a forensic tool for gathering information from portable devices, such as cell phones, tablets, PDAs, memory sticks, standalone GPS devices and USB drives.
Peter Stephenson Aug 1 2012 2:29PM Security
Review: ADF Solutions Triage-Examiner

Review: ADF Solutions Triage-Examiner

ADF Solutions Triage-Examiner is a forensic tool that scans target devices whether they are powered on or off.
Peter Stephenson Aug 1 2012 2:25PM Security
Review: Viewfinity Privilege Management

Review: Viewfinity Privilege Management

Any security administrator knows that they are only as strong as their weakest link. We have seen a lot of products in this group that focus on making sure devices are in compliance with the security policy, but what about the users?
Peter Stephenson Aug 1 2012 2:12PM Security
Review: SolarWinds Network Configuration Manager

Review: SolarWinds Network Configuration Manager

The SolarWinds Network Configuration Manager offers the ability to check all network devices, including routers, switches and firewalls, throughout the network environment against compliance and policy templates.
Peter Stephenson Aug 1 2012 2:00PM Security
Review: New Net Technologies NNT Change Tracker Enterprise

Review: New Net Technologies NNT Change Tracker Enterprise

NNT Change Tracker Enterprise from New Net Technologies offers a full suite of change management, file integrity, monitoring and policy management tools for network devices, including firewalls and systems, throughout the network environment.
Peter Stephenson Aug 1 2012 1:55PM Security
Review: NetWrix Change Reporter Suite

Review: NetWrix Change Reporter Suite

The Change Reporter Suite from NetWrix offers full change management across an entire network infrastructure.
Peter Stephenson Aug 1 2012 11:55AM Security
Review: NetIQ Secure Configuration Manager

Review: NetIQ Secure Configuration Manager

The Secure Configuration Manager from NetIQ offers a full systems and configuration management platform to manage both risk and policy across many network assets.
Peter Stephenson Aug 1 2012 11:51AM Security
Review: Lumension Risk Manager

Review: Lumension Risk Manager

Lumension Risk Manager is a piece of a larger suite called the Lumension Compliance and IT Risk Management platform.
Peter Stephenson Aug 1 2012 11:49AM Security
Review: FireMon Security Manager with Policy Planner and Risk Analyzer

Review: FireMon Security Manager with Policy Planner and Risk Analyzer

The FireMon Security Manager with Policy Manager and Risk Analyzer is the ultimate policy and risk management tool.
John Aug 1 2012 11:46AM Security
Review: Skybox Security Skybox View Enterprise Suite v6.0

Review: Skybox Security Skybox View Enterprise Suite v6.0

The Skybox View Enterprise Suite is a set of tools for firewall management, network compliance assessment, and risk and vulnerability management.
Peter Stephenson Aug 1 2012 11:44AM Security
Review: Rsam eGRC Platform v7.5

Review: Rsam eGRC Platform v7.5

The Rsam Enterprise GRC platform is a fully integrated, modularized platform supporting full GRC or individual module deployments.
Peter Stephenson Aug 1 2012 11:40AM Security
Review: RSA Archer eGRC Suite, RSA Archer eGRC Platform v5.1.4

Review: RSA Archer eGRC Suite, RSA Archer eGRC Platform v5.1.4

RSA Archer Risk Management enables users to proactively address risks to reputation, finances, operations and IT infrastructure as part of a governance, risk management and compliance (GRC) program.
Peter Stephenson Aug 1 2012 11:37AM Security
Review: RedSeal Networks RedSeal v5.0

Review: RedSeal Networks RedSeal v5.0

RedSeal v5.0 provides the intelligence necessary to proactively improve defenses, maintain continuous compliance and mitigate real-world risks by identifying all the available pathways of access and exposed vulnerabilities present across a network.
Peter Stephenson Aug 1 2012 11:34AM Security
Review: Modulo Risk Manager v7.6

Review: Modulo Risk Manager v7.6

Modulo Risk Manager is a single, fully integrated platform for organizations to automate and unify their IT governance, risk and compliance (GRC) processes.
Peter Stephenson Aug 1 2012 11:31AM Security
Review: MetricStream Risk Management Solution v6.0

Review: MetricStream Risk Management Solution v6.0

MetricStream Risk Management Solution enables organizations to identify, assess, quantify, monitor and manage their enterprise, operational and IT risks through an assessment-driven offering.
Peter Stephenson Aug 1 2012 11:24AM Security
Review: McAfee Total Protection (ToPS) for Compliance v7.X

Review: McAfee Total Protection (ToPS) for Compliance v7.X

McAfee Total Protection for Compliance uses agent-based and agentless technology to audit, assess and report across managed and unmanaged systems, reducing the time and effort required for impact assessment of new threats and patching and compliance audits of IT systems.
Peter Stephenson Jul 31 2012 3:14PM Security
Review: LockPath Keylight Platform v2.3

Review: LockPath Keylight Platform v2.3

LockPath's Keylight is a family of applications that manages enterprise risk and demonstrates compliance while providing visibility into corporate risk and security controls.
Peter Stephenson Jul 31 2012 3:11PM Security
Review: eGestalt Technologies SecureGRC Enterprise

Review: eGestalt Technologies SecureGRC Enterprise

SecureGRC is a cloud-based automated IT security and compliance management solution.
Peter Stephenson Jul 31 2012 3:06PM Security
Review: Citicus ONE release 3.4

Review: Citicus ONE release 3.4

Citicus ONE uses web-based data collection forms - including asset criticality assessments and risk scorecards underpinned by detailed threat and vulnerability checklists - to ensure that objective and consistent data is recording identifying risks to business applications, IT infrastructure and outsourced services.
Peter Stephenson Jul 31 2012 3:02PM Security

Log In

  |  Forgot your password?