Reviews

primary intro
security disaster recovery

biokey

REVIEW: BIO-key’s plug-in fingerprint readers for Windows 10 computers

BIO-key loaned me these three models for evaluation. I tested them on two notebooks: one running Windows 10 Home, and the other Windows 10 Pro. Find out the results.

shredded paper

5 apps for encrypting and shredding files

If you want to protect sensitive data -- especially if you’re sending it via email or via an online service -- one of these five encryption programs can help.

fort gun defense cyber protection

Check Point SandBlast takes endpoint protection to another level

Check Point has long been known as a firewall company but it is reaching beyond its roots with a new series of protective technologies under its SandBlast line.

security log monitoring

5 tools for making sense of system logs

Security and systems administrators discuss the best and worst features of log management products such Splunk, ArcSight and LogRhythm.

tools preventing data leaks 1

Top tools for preventing data leaks

Most security tools are focused on keeping external attackers at bay. But what about the sensitive data that lives inside your network? How do you make sure it doesn’t get out, either intentionally or by accident? That’s where Data...

cloud security decisions

What is a cloud access security broker and why do I need one?

CASB products provide a variety of security measures, including access control, firewall, identity management, anti-malware, DLP, encryption and threat management. So, what are the basic use cases for CASB?

cloud security

Cloud access security brokers deliver must-have protection for your SaaS apps

NetSkope edges CipherCloud and Bitglass in test of three ingenious and powerful cloud access security brokers.

Load More