Cisco's NAC goes off track, customers taken aback
As the most important supplier of network infrastructure to enterprises, Cisco's NAC products are a natural point of curiosity for network managers. Unfortunately, though, Cisco's approach to NAC has...
View ArticleVulnerability analysis tools add compliance features
Compliance is a natural extension of a vulnerability analysis tool. Normal vulnerability scanning includes searching for unpatched systems, unprotected directories and other errors in configuration.
View ArticleVulnerability analyzers offer Web scanning as an option
Web scanning is different from vulnerability scanning because it looks for bugs in the Web apps themselves, rather than in the software installed on the Web server. For example, all of the...
View ArticleHow we tested vulnerability analyzers
We developed a test methodology and evaluation criteria in six main areas, including results reporting, product controls and manageability, scan results, vulnerability workflow features,...
View ArticleFortinet has highest catch rate in IPS testing
We tested the intrusion prevention capabilities of each of the next-generation firewalls to determine how well they work and how the IPS integrates with system management.
View ArticleHow we tested next-generation firewalls
We tested next generation firewalls by looking at seven separate areas that we felt would be important to network managers trying to deploy these products in enterprise networks.
View ArticleSonicWall stands tall in SSL decryption testing
If one of the main advantages of a next-generation firewall is application and protocol identification and control, then SSL decryption is a basic requirement. We looked at the SSL decryption...
View ArticlePalo Alto next-gen firewall stacks up well
Palo Alto Networks has bet everything on being a next-generation firewall. Without the next-generation hook, Palo Alto has little chance at breaking into the established world of firewalls, and they've...
View ArticleReview: HP's new thin client raises the bar
Thin clients can't be cracked or hacked; they don't have fans or disks to fail; they don't need to be patched nearly as often as Windows; they don't draw much power; and they don't cost a whole lot of...
View ArticleCisco impresses with first crack at next-gen firewall
When we tested next-generation firewalls last May, at least one important security vendor wasn't there: Cisco, because they weren't ready to be tested. Now that the ASA CX next-generation firewall has...
View ArticleRiverbed wins 7-vendor WAN optimization test
As applications move to the cloud, network managers are seeing increasing requirements to optimize and manage WAN connections. Most enterprises have migrated to web-based applications and make heavy...
View ArticleIn Pictures: Top tools for WAN optimisation
Upstarts Exinda and Ipanema challenge network optimisation kingpin, Riverbed
View ArticleReview: Dell WYSE delivers Android-on-a-stick
Thin clients aren't very exciting, and for a reason: they're designed to allow remote access to servers, usually with a Citrix, Microsoft, or VMware client. The folks at Dell WYSE have spiced up the...
View ArticleFirst Look: Amazon Echo: Novelty item or ready-for-prime-time part of your...
Our Amazon Echo, a voice-controlled appliance--for want of a better word--arrived on May 17 and we've been using it all week. As Prime members, we paid $100 for ours, but the list price is $200. While...
View Article
More Pages to Explore .....