David Strom

David Strom writes and speaks about networking and communications topics for ITworld, Network World and other publications. He can be reached through his web site, or on Twitter @dstrom.

10 cutting-edge tools that take endpoint security to a new level

7 trends in advanced endpoint protection
Clear Choice Tests

7 trends in advanced endpoint protection

After extensive testing of 10 advanced endpoint protection products, we have identified a series of broad industry trends.

10 advanced endpoint protection tools

10 advanced endpoint protection tools

The days of simple endpoint protection based on traditional anti-malware tools are over. There are now advanced endpoint detection and response (EDR) tools that go beyond proactive monitoring and endpoint protection. Here are capsule...

9-vendor authentication roundup: The good, the bad and the ugly
Clear Choice Tests

9-vendor authentication roundup: The good, the bad and the ugly

New ‘smart’ tokens and risk-based factors deliver tighter security, but setups remain complex and user interfaces need a facelift.

Buyer’s Guide to 9 multi-factor authentication products

Buyer’s Guide to 9 multi-factor authentication products

The two-factor authentication market has moved toward what is now being called multi-factor authentication. One of the key features being new types of hardware-based tokens. Here are individual reviews of nine MFA products.

New endpoint security tools target zero-day attacks

New endpoint security tools target zero-day attacks

Most enterprises want an endpoint product that can prevent zero-day exploits and they want to be more proactive. We looked at two relatively new products, Carbon Black (now owned by Bit9) and Cylance Protect. Both are designed to...

Best tools for email encryption

Best tools for email encryption

The products we reviewed show good signs that encryption has finally come of age

Best tools for single sign-on

Best tools for single sign-on

Single mindednessSince we last looked at single sign-on products in 2012, the field has gotten more crowded and more capable. For this round of evaluations, we looked at seven SSO services: Centrify’s Identity Service, Microsoft’s...

These organizations will train, mentor and help you find your next job for free

Looking for a career change? These initiatives are committed to preparing you for a new job in the tech sector in your community

Best tools for cutting cloud costs

Best tools for cutting cloud costs

Cutting cloud costsImage by ShutterstockAs you move workloads to the cloud, you’ve probably already discovered that keeping track of your monthly cloud computing bills isn't easy.For this article, we looked at five shopping...

NAC is back. And better than ever

NAC is back. And better than ever

A NAC for securityFor this review, we were able to bring the following five vendors together: Enterasys/Extreme Networks Mobile IAM, Hexis Cyber Solutions NetBeat NAC, Impulse Point SafeConnect NAC, Pulse Policy Secure, and Portnox...

Why Israel could be the next cybersecurity world power

Why Israel could be the next cybersecurity world power

There are plenty of cities in the U.S. that want to lay claim to becoming the "next" Silicon Valley, but a dusty desert town in the south of Israel called Beersheva might actually have a shot at becoming something more modest, and...

Load More