Hawkeye G battles malware so you don't have to

The number and complexity of cyber threats leveled against enterprises of all sizes these days is staggering. There's everything from advanced persistent threats created by well-sponsored nation states to disgruntled insiders looking to make a fast buck or enact revenge for some perceived wrongdoing.

By By John Breeden II | 08 December, 2014 22:14

Tags: HP, security, malware

Review: Austria's Angelbird laptop SSD

Typically, when I review a solid-state drive (SSD) it comes from one of the half dozen or so big name manufacturers, such as Toshiba, SanDisk, Intel, Micron, Samsung and Seagate.

By Lucas Mearian | 07 November, 2014 07:17

Tags: Data storage, Angelbird, toshiba, Components, sandisk, intel, memory

Six browser plug-ins that protect your privacy

It's no stretch to say that ads are what make the Web go 'round. The content you're reading right now? Paid for by ads. Google, Facebook, Pandora, YouTube? Driven by ads. This is not a new concept: TV and radio have relied on commercials since their earliest days. Because, let's face it, something has to pay for all the free programming and services.

By Rick Broida | 17 October, 2014 21:43

Tags: Google, security, Pandora, data privacy, beca, disconnect, privacy, youtube, Facebook

Review: Samsung's new 3D NAND SSD for 'Pros' is a superfast drive at a good price

Samsung's new 850 Pro SSD series has up to 1TB of capacity and is designed for workstations and high-end PCs.

By Lucas Mearian | 01 July, 2014 20:08

Tags: SSD, Data storage, Drives, storage, computerworld

Tails 1.0: A bootable Linux distro that protects your privacy

Whatever your primary OS, Linux distro Tails 1.0 offers a plethora of security features to help you work online without worrying about privacy issues.

By Carla Schroder | 10 May, 2014 05:48

Tags: Linux and Unix, security, privacy

Review: FireEye fights off multi-stage malware

You can't see some malware until it's too late. Sophisticated attacks arrive in pieces, each seemingly benign. Once these advanced attacks reassemble, the target is already compromised.

By David Newman | 05 May, 2014 22:38

Tags: choice, security, FireEye, Wide Area Network, anti-malware

Unisys unveils invisibility cloak for network traffic

If you are ultra paranoid, what could be better than hiding your network traffic in such a way that no one could possibly intercept it? This is what Unisys is offering with its new Stealth appliance, which could make man-in-the-middle attacks and keylogger exploits obsolete, or at least more difficult to mount.

By David Strom | 05 May, 2014 20:38

Tags: network security, management, Networking, security, infrastructure management, Network management, unisys

AirMagnet breaks new ground in wireless spectrum analysis

Everyone needs a Wi-Fi spectrum analyzer, but there are times when analyzing cellular spectrum is also essential. Fluke Networks' new AirMagnet Spectrum ES provides a broad range of capability at a very attractive price. Spectral analysis, a longstanding fixture in electronics and manufacturing test, and, more recently as a valuable tool for understanding coverage, interference, and other elements of Wi-Fi, is the art and science of extracting meaning and insight from wireless systems at Layer 1 -- radio waves.

By Craig Mathias | 24 March, 2014 11:10

Tags: Networking, wireless, Wireless Management, anti-malware

Averail Access aces mobility management test

Enterprise mobility management (EMM) can encompass a broad range of functions, from managing mobile devices, to applications, expenses, personnel, and policies. But perhaps the most important aspect is mobile information/data/content management, tracking the distribution and usage of sensitive organizational data, as well as ensuring appropriate security and policy compliance.

By Craig Mathias | 20 January, 2014 11:53

Tags: Configuration / maintenance, network storage, dropbox, storage, Networking, wireless, hardware systems, Wireless Management, Data Center, anti-malware, Storage Management

Review: PowerCloud delivers Wi-Fi access point and cloud-based management for small business

PowerCloud Systems has released a cloud-based Wi-Fi solution that fills the gaps between residential products that lack management and features, and enterprise systems that can be overkill in smaller organizations.

By Craig Mathias | 11 November, 2013 12:13

Tags: Wi-Fi, Networking, wireless, WLANs / Wi-Fi, anti-malware

Smart card readers for the iPhone and iPad

Flexible PKard Reader and elegant Tactivo bring smart card authentication to your favorite mobile device

By Joseph Roth | 09 October, 2013 21:06

Tags: ios, hardware systems, iPhone, tablets, software, authentication, operating systems, iPad, mobile technology, Thursby Software, consumer electronics, security, smartphones

Review: Samsung's most affordable, triple-level cell SSD

Samsung claims its latest consumer drive, one of a new generation of three-bits-per-cell NAND flash devices, has the same endurance and performance, but a lower price, than its predecessors.

By Lucas Mearian | 25 September, 2013 10:07

Tags: SSD, Data storage, Drives, storage

Super-fast Wi-Fi: Cisco, Ubiquiti access points top out at nearly 400Mbps

Earlier this year we tested several consumer-level 802.11ac routers. Here, we take a look at two enterprise-level access points. They're a part of the so-called "Wave 1" phase of the 802.11ac standard: both access points support up to three spatial streams and 80 MHz wide channels, offering theoretical data rates up to 1.3Gbps. But just as we saw with the 802.11ac routers, you won't get throughput rates nearly that fast.

By Eric Geier | 16 September, 2013 10:35

Tags: Wi-Fi, Networking, wireless, WLANs / Wi-Fi, anti-malware

Best tools for protecting passwords

For enterprises trying to get a handle on password management, the good news is that there are products that can help implement stronger password policies for end users logging into corporate and personal Web-based services, as well as for employees who share a local server login.

By David Strom | 03 September, 2013 10:23

Tags: Trendmicro, LastPass, security, endpoint security, Wide Area Network

What to look for when evaluating password manager software

Here are the significant issues that can distinguish one password manager product from another. You'll probably make a similar list of requirements as you do your own research for password managers.

By David Strom | 03 September, 2013 06:04

Tags: Blackberry, Apple, LastPass, dropbox, security, endpoint security, Wide Area Network

What is a vulnerability?

Judging by initial appearances, our security testing turned up a ton of vulnerabilities – nearly 150 of them. In reality, however, none represented actual issues in the Huawei switch.

By David Newman | 30 August, 2013 06:15

Tags: Rapid7, Ethernet Switch, security, Wide Area Network, LAN & WAN

F5 data center firewall aces performance test

Huge data center, check. Multiple 10G Ethernet pipes, check. Load balancer, check. Firewall? Really? Do network architects need to buy yet another box, and likely take a performance hit?

By David Newman | 22 July, 2013 11:21

Tags: F5 Networks, choice, Firewall & UTM, security, Wide Area Network

Smart card readers for the iPhone and iPad

Flexible PKard Reader and elegant Tactivo bring smart card authentication to your favorite mobile device

By Joseph Roth | 10 July, 2013 13:24

Tags: ios, hardware systems, smartphones, iPhone, tablets, software, authentication, operating systems, iPad, mobile technology, consumer electronics, security

Keep watch: 5 cloud security cameras for your home

Cloud-based security cameras can keep watch on your home when you're not around. We tested 5 of these systems and report on our findings.

By Robert L. Mitchell | 25 June, 2013 13:33

Tags: Computer Peripherals, security, netgear, cloud security, logitech, D-Link, cloud computing, internet

Cisco impresses with first crack at next-gen firewall

When we tested next-generation firewalls last May, at least one important security vendor wasn't there: Cisco, because they weren't ready to be tested. Now that the ASA CX next-generation firewall has had a year to mature, we put the product through its paces, using the same methodology as our last NGFW test.

By Joel Snyder | 17 June, 2013 11:23

Tags: Firewall & UTM, security, Wide Area Network

Top Whitepapers

Featured Whitepapers