Security » Reviews »
Connecting remotely to network servers is a fact of life for millions of end users. Whether working from a PC or a mobile device, users rely on secure, reliable remote connections to maintain their productivity.
Available since Windows Server 2008 R2, Microsofts DirectAccess server role became fully integrated with the OS in Windows Server 2012. DirectAccess is designed to connect a VPN-type session automatically as soon as a compatible Windows client is connected to the Internet.
Most of the products tested (except Windows Server 2012), use Oracle's Java in one form or another, at least for client access and also in some cases within the management interface. With numerous vulnerabilities recently discovered in Java, leading to guidance from Department of Homeland Security and others to disable it entirely, this raised some questions about usability and possibly even security of the devices tested.
Offering Wi-Fi can be a good way to increase return customers and boost revenue in retail stores, hotels, cafes, etc. And it provides convenience for contractors and associates working in corporate offices and conference rooms. Though visitors might have 4G mobile devices or laptops, Wi-Fi can provide a faster, higher quality connection.
Finding the right business tablet can be a daunting task. Do you want a 7-inch display or a 10 inch? Built-in keyboard? Snap-on keyboard? Which operating system? What apps? How about ruggedness, style, battery life, price?
The newest Wi-Fi technology -- 802.11ac -- promises blazing speeds of up to 1.3Gbps, according to claims made by the leading vendors.
During our review of 802.11ac routers, some of the vendors sent along additional products that they thought we might be interested in. Here are short reviews of four WiFi tools that you might find useful in your network.
In the early days of Wi-Fi, site surveys were fairly basic and involved running around with a laptop looking at simple signal levels. The next step was mapped-based tools that provided a good visual of Wi-Fi coverage, but still involved carrying a bulky laptop around.
Samba's open source alternative to Microsoft's domain controller is a good start, but not ready for prime time
Deploying the enterprise mode of Wi-Fi Protected Access (WPA2) with 802.1X authentication provides great Wi-Fi security, but complicates the client configuration and connection process. In bring-your-own-device (BYOD) environments, this can cause user frustration and a spike in help desk calls. The solution is to deploy an automated configuration process so users can easily connect their devices without invention from IT staff.
HP's OpenStack-based IaaS cloud blends openness and portability with nice proprietary extras and welcome hand-holding
Hate having to record your expenditures for the IRS or your company's accounting department? These iPhone and Android apps can make it easier to track your expenses.
Remote Authentication Dial-In User Service (RADIUS) servers are common in enterprise networks to offer centralized authentication, authorization and accounting (AAA) for access control. But RADIUS servers can also be useful in small and midsize networks to enable 802.1X authentication and WPA2 (802.11i) security for Wi-Fi nets.
WordPress has developed into a full-fledged content management system. We look at 10 essential plugins that make it even better.
Security suites from McAfee, Symantec, Trend Micro and Webroot offer protection for all your devices along with Web-based management.
Google's new compute cloud offers a crisp and clean way to spin up Linux instances and easily tap other Google APIs
With serious data breaches occurring on almost a daily basis, concerns about data protection have skyrocketed. While some experts believe endpoint breaches may no longer comprise the majority of data leaks, the intentional or unintentional release of sensitive data from endpoints within an organization, whether by employees, contractors or guests, remains a serious problem that data loss prevention (DLP) products seek to address.
The Cisco Ironport is an appliance that is deployed into an existing mail infrastructure. All emails are sent to the IronPort and the IronPort is either the last point out (most common configuration) or it can process email and then send it back to the mail server where it is sent out.
We tested multiple common endpoint scenarios, by trying to upload, print, email or otherwise transfer data that should be blocked, quarantined, warned about or simply monitored under the rules and policies we set up. The following specific types of endpoint tests were conducted:
It's lacking enough functionality to make it worth waiting for subsequent versions, Jonathan Hassell says, unless you're building Azure apps right now.
Organizations that are looking for security features including identity management, encryption and access control — and at the same time want to take advantage of the cost and flexibility benefits of the cloud —might check into security-as-a-service offerings available now from several vendors. Download now to find out more.
UltraISO is an ISO CD/DVD image file tool that creates, edits and converts. It is also a bootable CD/DVD maker that has the ability to ...
Allianz Shared Infrastructure Services SE (ASIC) wanted to replace its current suite of management tools, some of which had been developed in-house, with a standard solution for the management of 600 network components in its data centre, in order to reduce costs and further improve quality. Find out what approach they took download today.
- FTJob Title: Mac Systems/ Enterprise Systems EngineerNZ
- FTTechnical Business AnalystNSW
- FTTest EngineerVIC
- FTR&D EngineerSA
- FTOS Web Applications DeveloperNSW
- FT.NET - Sitecore Developer - Melbourne - PermNSW
- FTQuality ManagerSA
- FTSenior Python DeveloperNSW
- FTFlash / ActionScript Developer - ContractNSW
- FTLead Software EngineerSA
- FTWeb Analyst - WebTrendsVIC
- CITRIX SYNERGY ’13: Look beyond Cloud infrastructure, says Liang
- CITRIX SYNERGY ’13: Christiancen highlights the need for collaboration
- CITRIX SYNERGY ’13: Devices will change how people work, says Duursma
- IN PICTURES: Citrix Solutions expo (49 photos)
- IN PICTURES: Citrix parties one more night with Maroon 5 ( +57 photos)
- Analytics and personalisation drive leading marketer behaviour: Report
- Innovation and big data take centre stage during CMO panel
- Twitter targets second screen interaction with Amplify advertising partnerships
- Facebook talks hyper-targeting, analytics and cross-platform at AANA event
- Tapping into social experience: Tourism Australia