Review: File Recovery Tools
We've previously covered a range of tools to securely delete data, but what if you want to recover data? Perhaps you want to make sure a secure deletion works as intended, or restore data written over...
View ArticleReview: Mobile Security
With mobile devices now ubiquitous in the workplace, you need to have some level of protection in place. Ashton Mills investigates.
View ArticleReview: Mobile Device Management
With the rise of mobile computing -- first via laptops, then smartphones and now tablets -- the IT landscape changed within the enterprise. No more was IT just about the local network, WANs and...
View ArticleLANDesk Total User Management 9.5 Review
LANDesk’s foray into system, asset and user management is the latest version of its Total User Management suite, which we’ll affectionately call TUM.
View ArticleReview: Linux Security Distributions
Where once Linux was relegated to long-bearded gurus sitting atop servers bathed in a the dull glow of fluorescent lighting, today it's much more hip and found in one form or another in most...
View ArticleWatchGuard XTM 2520
If, as we are often led to believe, colour really is an indication of speed then the WatchGuard XTM 2520 would have to be the fastest hardware firewall solution on the planet. Or at least, in the rack.
View ArticleEndpoint Security Products: Part 1
In a sphere that changes as rapidly as security, it's no surprise that 'endpoint' as a definition is fluid. It is so new a sphere in the IT arsenal that not even the players who field endpoint products...
View ArticleReview: Security firewall distributions
Firewalls underpin the security of any network, controlling the flow of data in and out. Where once they were simple in premise and execution, today they are just one component of a collection of...
View ArticleReview: Drive imaging software
Drive imaging is one of those essential tools that is simple in principle yet can be complex in implementation.
View ArticleSecure web services
If there's one thing the Snowden leaks have shown us, it's that security and privacy are largely an illusion. Yet, it's still possible to make it harder not just for criminals and hackers but also...
View ArticleSelf-encrypting drives
As data becomes ever more mobile there's an increased risk that it can fall into the wrong hands. And, while there are many technologies to try and prevent this from happening, or tracking a device...
View ArticleEnterprise password managers
Password management is big business, and with good reason: the weakest link in your network's security is the human component -- the one that can succumb to social engineering, phishing, or...
View ArticleEnterprise sync and share services
One of the fastest growing segments of the cloud landscape is file sync and share, extending cloud storage with collaborative capabilities to maximise employee productivity, all without sacrificing –...
View ArticleSecure cloud backup : Review
To help you narrow down your options, here's our take on some of the more popular and well-known services, as well as some you may not have heard of. Use these as a springboard—again, there are plenty...
View ArticleRemote Desktop Software: Review
Remote desktop software is a linchpin for any IT department, so it's no wonder there's a wide range of products on offer to cater for different requirements and environments. And this only has become...
View Article