Reviews

email encryption
red blue tools

false identity

Face-off: Oracle vs. CA for identity management

Considering identity and access management (IAM) software? Download this free report for side-by-side comparisons of rival products from Oracle and CA, based on reviews written by enterprise users of the products.

security cameras secure

REVIEW: Home security cameras fall short on security

In tests of 7 IP-based cameras, only Canary passed muster.

best home security cameras

6 steps to secure a home security camera

No device is 100 percent immune from vulnerabilities, but there are some simple, common-sense steps you can take to protect IP-based cameras.

primary intro

Review: Threat hunting turns the tables on attackers

For this review, we tested threat hunting systems from Sqrrl, Endgame and Infocyte. Each program was tested in a large demo environment seeded with realistic APT threats which had bypassed perimeter defenses and were hiding somewhere...

security disaster recovery

4 top disaster recovery packages compared

There’s arguably no more important IT task than making sure business systems and data can be restored after a disaster. So we asked system administrators to identify the best features — and what’s missing — in four leading software...

biokey

REVIEW: BIO-key’s plug-in fingerprint readers for Windows 10 computers

BIO-key loaned me these three models for evaluation. I tested them on two notebooks: one running Windows 10 Home, and the other Windows 10 Pro. Find out the results.

shredded paper

5 apps for encrypting and shredding files

If you want to protect sensitive data -- especially if you’re sending it via email or via an online service -- one of these five encryption programs can help.

fort gun defense cyber protection

Check Point SandBlast takes endpoint protection to another level

Check Point has long been known as a firewall company but it is reaching beyond its roots with a new series of protective technologies under its SandBlast line.

security log monitoring

5 tools for making sense of system logs

Security and systems administrators discuss the best and worst features of log management products such Splunk, ArcSight and LogRhythm.

Load More