Review: The Absolute Platform with Persistence Technology

Absolute is a long-time player in the endpoint security arena, specializing in endpoint visibility and control. Regarded as an industry leader in IT asset management for more than two decades, Absolute recently revamped its solution to leverage its pat… Continue reading Review: The Absolute Platform with Persistence Technology

Review: Cato Cloud

The Innovation Sandbox at the RSA Conference is one of the show’s events that I never miss. Back in February, I watched through the demos and live presentations of Cato Networks, one of the event’s ten finalists. Even in a room packed with innovative technologies, their solution – described as “network + security as a service” – definitely stood out. Cato Cloud is a custom-built, SLA-backed backbone that provides global organizations a one-stop solution for … More Continue reading Review: Cato Cloud

Review: Pwnie Express Pulse

Pwnie Express Pulse is a SaaS offering that uses custom hardware sensors to provide continuous network discovery, threat detection, risk assessment, and critical information about all security issues that should be resolved. After seeing Pulse in action, I can say that Pwnie Express came a long way from being a crowd pleaser at security conferences where people were obsessing over PwnPhone or PwnPlug, a penetration testing device that mimicked a surge protector. In case you … More Continue reading Review: Pwnie Express Pulse

Review: Acunetix 11

Acunetix is one of the biggest players in the web security arena. The European-based company released the first version of their product back in 2005, and thousands of clients around the globe use it to analyze the security of their web applications. They recently unveiled Acunetix version 11, so we’ve decided to take it for a spin. Interface, users and roles Before I start, it needs to be noted that I’ve tested the on-premise edition … More Continue reading Review: Acunetix 11

Review: FourV Systems GreySpark

GreySpark is a solution for measuring and managing organizations’ IT security risk. GreySpark ingests information security metadata from a large range of existing sensors, applies the risk model to the data, and presents it in a way that’s helpful to risk and financial executives, as well as the IT people who need to drill down into details. From a technical perspective, the customer installs a single data collection agent inside the network. A cloud variant … More Continue reading Review: FourV Systems GreySpark

Enhance iMessage security using Confide

One of the new features in iOS 10 offers the possibility of deploying specially crafted applications within iMessage. Most users will probably (ab)use this new functionality for sending tiresome animations and gestures, but some applications can actually provide added value for iMessage communication. Confide for iMessage seems like a nice addition for those who want to build on the already solid security foundation of the iMessage/Messages environment. Confide is a confidential messaging app. It has … More Continue reading Enhance iMessage security using Confide

Review: Boxcryptor

Storing your data in the cloud comes with both positive and negative aspects. Boxcryptor is a solution that helps with this by encrypting your data on your device before it gets synchronized to the cloud storage provider of your choice. Zero-knowledge encryption Boxcryptor is a zero-knowledge service provider, as all the private and sensitive information is always stored in an encrypted form and protected by the user’s password, which is never sent to the company … More Continue reading Review: Boxcryptor

Review: iStorage datAshur Pro

Whenever I travel, I take data I might need with me on a secure USB flash drive. Ages ago, I would encrypt these files with GPG and move them to a generic USB drive. After that I used the encrypted flash drives that needed a client software for accessing the secure data. Both of these options required software to work, whether a standalone encryption tool, device driver or a tied in application. iStorage datAshur Pro … More Continue reading Review: iStorage datAshur Pro

Review: True Key for iOS

I’ve been using 1Password for years – both their desktop and mobile products. Altough it works fine, I was curious to see what are the alternatives I can use on my iPhone. After some hits and misses, I’ve installed the True Key personal password manager, which is developed by Intel Security and offered for free. True Key in action I am not what you would call an avid user of iOS applications. I’ve tried and/or … More Continue reading Review: True Key for iOS