Security / Reviews

Unisys unveils invisibility cloak for network traffic

If you are ultra paranoid, what could be better than hiding your network traffic in such a way that no one could possibly intercept it? This is what Unisys is offering with its new Stealth appliance, which could make man-in-the-middle attacks and keylogger exploits obsolete, or at least more difficult to mount.

Written by David Strom05 May 14 20:38

AirMagnet breaks new ground in wireless spectrum analysis

Everyone needs a Wi-Fi spectrum analyzer, but there are times when analyzing cellular spectrum is also essential. Fluke Networks' new AirMagnet Spectrum ES provides a broad range of capability at a very attractive price. Spectral analysis, a longstanding fixture in electronics and manufacturing test, and, more recently as a valuable tool for understanding coverage, interference, and other elements of Wi-Fi, is the art and science of extracting meaning and insight from wireless systems at Layer 1 -- radio waves.

Written by Craig Mathias24 March 14 11:10

Averail Access aces mobility management test

Enterprise mobility management (EMM) can encompass a broad range of functions, from managing mobile devices, to applications, expenses, personnel, and policies. But perhaps the most important aspect is mobile information/data/content management, tracking the distribution and usage of sensitive organizational data, as well as ensuring appropriate security and policy compliance.

Written by Craig Mathias20 Jan. 14 11:53

3 Powerful Laptops Built for Serious Business

Looking for a laptop with serious processing power? CIO.com put three high-end laptops -- the Soni Vaio Flip 15, the HP ZBook 15 and the Acer Aspire V3 -- to the photo- and video-editing test to see which offers the best bang for the buck.

Written by John Brandon08 Jan. 14 13:53

Super-fast Wi-Fi: Cisco, Ubiquiti access points top out at nearly 400Mbps

Earlier this year we tested several consumer-level 802.11ac routers. Here, we take a look at two enterprise-level access points. They're a part of the so-called "Wave 1" phase of the 802.11ac standard: both access points support up to three spatial streams and 80 MHz wide channels, offering theoretical data rates up to 1.3Gbps. But just as we saw with the 802.11ac routers, you won't get throughput rates nearly that fast.

Written by Eric Geier16 Sept. 13 10:35

Best tools for protecting passwords

For enterprises trying to get a handle on password management, the good news is that there are products that can help implement stronger password policies for end users logging into corporate and personal Web-based services, as well as for employees who share a local server login.

Written by David Strom03 Sept. 13 10:23

What to look for when evaluating password manager software

Here are the significant issues that can distinguish one password manager product from another. You'll probably make a similar list of requirements as you do your own research for password managers.

Written by David Strom03 Sept. 13 06:04

What is a vulnerability?

Judging by initial appearances, our security testing turned up a ton of vulnerabilities – nearly 150 of them. In reality, however, none represented actual issues in the Huawei switch.

Written by David Newman30 Aug. 13 06:15

F5 data center firewall aces performance test

Huge data center, check. Multiple 10G Ethernet pipes, check. Load balancer, check. Firewall? Really? Do network architects need to buy yet another box, and likely take a performance hit?

Written by David Newman22 July 13 11:21

Windows To Go: The Forgotten Version of Windows 8

The ability to carry a Windows 8 image on a USB stick, plug it into any Windows 8 PC and separate corporate and personal data should appeal to anyone who frequently travels or simply hates lugging a laptop around. But Windows to Go isn't catching on. Will Windows 8.1 change that?

Written by Rob Enderle19 July 13 14:32

Cisco impresses with first crack at next-gen firewall

When we tested next-generation firewalls last May, at least one important security vendor wasn't there: Cisco, because they weren't ready to be tested. Now that the ASA CX next-generation firewall has had a year to mature, we put the product through its paces, using the same methodology as our last NGFW test.

Written by Joel Snyder17 June 13 11:23

Cisco edges F5 in VPN shootout

Connecting remotely to network servers is a fact of life for millions of end users. Whether working from a PC or a mobile device, users rely on secure, reliable remote connections to maintain their productivity.

Written by Susan Perschke22 April 13 14:04

Microsoft DirectAccess impresses

Available since Windows Server 2008 R2, Microsofts DirectAccess server role became fully integrated with the OS in Windows Server 2012. DirectAccess is designed to connect a VPN-type session automatically as soon as a compatible Windows client is connected to the Internet.

Written by Susan Perschke22 April 13 10:57

Java security questions answered

Most of the products tested (except Windows Server 2012), use Oracle's Java in one form or another, at least for client access and also in some cases within the management interface. With numerous vulnerabilities recently discovered in Java, leading to guidance from Department of Homeland Security and others to disable it entirely, this raised some questions about usability and possibly even security of the devices tested.

Written by Susan Perschke22 April 13 10:57

5 Cool Corporate Retreat and Training Centers

It pays to get the staff out of the office every once in a while. These five example highlight facilities offer amenities that work well for training, team-building, relaxing or letting loose.

Written by John Brandon18 April 13 15:51

Hot hotspot gateways

Offering Wi-Fi can be a good way to increase return customers and boost revenue in retail stores, hotels, cafes, etc. And it provides convenience for contractors and associates working in corporate offices and conference rooms. Though visitors might have 4G mobile devices or laptops, Wi-Fi can provide a faster, higher quality connection.

Written by Eric Geier01 April 13 14:10
  • Leveraging data and backups to maintain business continuity

    Veeam

    Veeam® recognizes the new challenges companies across the globe face in enabling the Always-On Enterprise™, a business that must operate 24/7/365. To address this, Veeam has pioneered a new market of Availability for the Always-On Enterprise™ by helping organizations meet recovery time and point objectives (RTPO™) of less than 15 minutes for all applications and data, through a fundamentally new kind of solution that delivers high-speed recovery, data loss avoidance, verified recoverability, leveraged data and complete visibility. Veeam Availability Suite™, which includes Veeam Backup & Replication™, leverages virtualization, storage, and cloud technologies that enable the modern data center to help organizations save time, mitigate risks, and dramatically reduce capital and operational costs, while always supporting the current and future business goals of Veeam customers

  • []