test

Computer scientists test social network theory

Computer scientists test social network theory

US boffins test 'six degrees of separation' assertion.
Robert Jaques Aug 23 2006 10:13AM Oddware
Review: NetPilot

Review: NetPilot

The NetPilot appliance is simple to set up – you just plug it in and turn it on. It has clearly labelled ports for all network connections.
Peter Stephenson,CeRNS, Aug 10 2006 12:00AM Security
Review: Proventia Network MFS Appliance

Review: Proventia Network MFS Appliance

This product was amazingly easy to set up and use. Recommended for its power and simplicity, we had it up and running in no time at all.
Peter Stephenson,CeRNS, Aug 10 2006 12:00AM Security
Review: Sidewinder G2 1100C

Review: Sidewinder G2 1100C

The Sidewinder G2 is a powerful multi-function security tool, but requires some experience to get really comfortable with its management.
Peter Stephenson,CeRNS, Aug 10 2006 12:00AM Security
Review: VPN-1 UTM Edge Appliance

Review: VPN-1 UTM Edge Appliance

This is a user-friendly gateway-style appliance. Installation is made simple by an easy-to-follow setup wizard that sets up the initial port configuration for connecting to the internet and licensing the product. After setup, the intuitive web interface is used for all policy and device management.
Peter Stephenson,CeRNS, Aug 10 2006 12:00AM Security
Review: DFL-M510

Review: DFL-M510

The DFL-M510 is extremely easy to use. Take it out of the box, plug it in, log in to the Java-based web interface and follow the setup wizard for a quick, seamless installation into the network. Once the device is set up, the management interface becomes a one-stop shop for system and policy management, as well as for generating monitors, logs, and reports.
Peter Stephenson,CeRNS, Aug 9 2006 12:00AM Security
Review: Finjan Vital Security Web Appliance NG-5100

Review: Finjan Vital Security Web Appliance NG-5100

This appliance is in-depth and focused on malware, lacking VPN and IDS/IPS capabilities. The configurations are granular and take a lot of time to put in place. While the setup and installation of the NG-5100 are very simple, configuration is not an easy task. That said, documentation plays a large role in making the configuration process much less arduous.
Peter Stephenson,CeRNS, Aug 9 2006 12:00AM Security
Review: FortiGate-300A

Review: FortiGate-300A

We found this product reasonably simple to use. The web interface is easy to navigate and is laid out in an organised manner. But configuring the ports properly and setting up the initial configuration and policies was a little confusing.
Peter Stephenson,CeRNS, Aug 9 2006 12:00AM Security
Review: InstaGate PRO

Review: InstaGate PRO

This product is feature-rich and especially easy to use and administrate. Setting it up is as simple as taking it out of the box and plugging it in. It is then configured using the simple web interface-based setup wizard.
Peter Stephenson,CeRNS, Aug 9 2006 12:00AM Security
Review: NETASQ F800 UTM Appliance

Review: NETASQ F800 UTM Appliance

The NETASQ F800 appears to have a simple setup, but configuration was another story. After going through a setup procedure that involves changing IP addresses of its interfaces and the management computer, the appliance then has to be licenced.
Peter Stephenson,CeRNS, Aug 9 2006 12:00AM Security
Review: CounterACT

Review: CounterACT

This product has a simple, straightforward setup and initial configuration, and generally, we found it easy to work with. Understanding the console takes some reading of the documentation, though. ForeScout uses many non-traditional icons and the interface can be confusing to start with, but the console user guide is very helpful in explaining how to use the interface.
Peter Stephenson,CeRNS, Aug 8 2006 12:00AM Security
Review: Coroner's Toolkit

Review: Coroner's Toolkit

The Coroner’s Toolkit, or TCT is an open-source set of forensic tools for performing post-mortem analysis on Unix systems. Written by Dan Farmer and Wietse Venema, both very well known in security circles for such programs as SATAN, TCT is not an easy product to use. A serious knowledge of Unix is a prerequisite for success, but if you can manage it, this is an extremely powerful set of tools.
Peter Stephenson,CeRNS, Jul 11 2006 12:00AM Security
Review: EnCase Forensic

Review: EnCase Forensic

This new version of EnCase shows its pedigree as the oldest of the GUI-based IT forensic tools. We found it very simple to operate and use.
Peter Stephenson,CeRNS, Jul 11 2006 12:00AM Security
Review: Forensic ToolKit

Review: Forensic ToolKit

The Forensic ToolKit (FTK) is very powerful and comes loaded with features, although it is naturally difficult to make such a powerful tool completely simple to use. The program interface can overwhelm at first glance, with all its different features and options, but after reading the documentation and getting to know the program, it becomes much more intuitive.
Peter Stephenson,CeRNS, Jul 11 2006 12:00AM Security
Review: i2 Analyst's Notebook

Review: i2 Analyst's Notebook

This is a very different type of analysis tool from those infosec professionals are used to. Link analysis, a crucial aspect of incident response, is usually done manually or by trying to use log correlators. This is a true link analyser with a long pedigree in analysing complex crimes and security incidents.
Peter Stephenson,CeRNS, Jul 11 2006 12:00AM Security
Review: LogLogic LX 2000

Review: LogLogic LX 2000

LogLogic’s LX 2000 is an excellent log analysis tool. It is powerful, can be distributed, and is a mature and useful product. But it is not for the faint-hearted. While its user interface is excellent, it has many hidden capabilities that require some time to understand.
Peter Stephenson,CeRNS, Jul 11 2006 12:00AM Security
Review: Mandiant First Response

Review: Mandiant First Response

First Response is a freeware audit tool and is a little difficult to use in the beginning. The interface, deploying agents and gathering data can also be a little awkward at first, but this program can be very useful once the user has a grasp on what it does and what it is capable of.
Peter Stephenson,CeRNS, Jul 11 2006 12:00AM Security
Review: NetWitness

Review: NetWitness

NetWitness is a network traffic security analyser that the vendor describes as a “security intelligence” tool. Setup is simplified by its new installation wizard, that worked correctly the first time, and was a breeze. We then fed it a set of snort packet logs, that it accepted without complaint, and were able to begin analysis within an hour.
Peter Stephenson,CeRNS, Jul 11 2006 12:00AM Security
Review: ProDiscover Incident Response

Review: ProDiscover Incident Response

ProDiscover IR is a complete IT forensic tool that can access computers over the network (with agents installed) to enable media analysis, image acquisition and network behaviour analysis.
Peter Stephenson,CeRNS, Jul 11 2006 12:00AM Security
Review: Sleuth Kit & Autopsy Browser

Review: Sleuth Kit & Autopsy Browser

Sleuth Kit and Autopsy Browser are excellent examples of what happens when a talented developer builds on good prior work. These products, used together, are freeware open-source computer forensic tools built on the Coroner’s Toolkit. But the developer, Brian Carrier, has taken his considerable expertise in file systems of all kinds and applied it here.
Peter Stephenson,CeRNS, Jul 11 2006 12:00AM Security

Log In

  |  Forgot your password?