When we tested next-generation firewalls last May, at least one important security vendor wasn't there: Cisco, because they weren't ready to be tested. Now that the ASA CX next-generation firewall has had a year to mature, we put the product through its paces, using the same methodology as our last NGFW test.
Joel Snyder |
17 Jun |
Read more
LANDesk’s foray into system, asset and user management is the latest version of its Total User
Management suite, which we’ll affectionately call TUM.
Ashton Mills |
29 May |
Read more
What is big, flexible, red and costs more than your average mid-range family sedan? Not a HSV—not quite that much—but this top of the range unified threat management (UTM) device (or in this case, XTM– the X presumably being a variable) is definitely in a high performance category. The XTM2050 from WatchGuard is one of a new breed of security devices that packs punch.
Matt Tett |
22 May |
Read more
Review of the Juniper EX4500 Ethernet switch. They connect desktops to servers in the data centre via a three-tier system of access, aggregation and core Ethernet switches.
Matt Tett |
17 Nov |
Read more
With data becoming more valuable, the need for security also gets greater. Today’s technology and working behaviours both facilitate data being easily transported. Information is far less static due to home working, multiple office sites, low cost USB storage devices and DVDs. With all these portable devices and data being moved from place to place we must be mindful of data backup.
Enex Testlab |
16 Oct |
Read more
Cyber-attacks are constantly evolving and the attack methods used are constantly adapting. In a similar way, the traditional layers of defence have grown increasingly complex and interrelated. The convergence of security technologies to a single appliance; the Unified Threat Management (UTM) device is a logical approach and can go a long way towards managing security in most organisations.
Enex Testlab |
15 Jul |
Read more
In order to improve productivity and minimise risk, most organisations need a reliable method of protecting their employees from unwanted email (spam) and malicious software (malware). In addition, it is also necessary to protect the corporate network by restricting access to inappropriate content.
Enex Testlab |
22 Jun |
Read more