Cameron Sturdevant

About

Cameron Sturdevant is the executive editor of Enterprise Networking Planet. Prior to ENP, Cameron was technical analyst at PCWeek Labs, starting in 1997. Cameron finished up as the eWEEK Labs Technical Director in 2012. Before his extensive labs tenure Cameron paid his IT dues working in technical support and sales engineering at a software publishing firm . Cameron also spent two years with a database development firm, integrating applications with mainframe legacy programs. Cameron's areas of expertise include virtual and physical IT infrastructure, cloud computing, enterprise networking and mobility. In addition to reviews, Cameron has covered monolithic enterprise management systems throughout their lifecycles, providing the eWEEK reader with all-important history and context. Cameron takes special care in cultivating his IT manager contacts, to ensure that his analysis is grounded in real-world concern. Follow Cameron on Twitter at csturdevant, or reach him by email at [email protected].

Password Tools Lower Compliance Costs

Password management systems including single-sign-on tools such as RSA Sign-On Manager 4.5 can drastically reduce a number of IT costs, not the least of which are those associated with regulatory compliance. When single-sign-on tools are combined with two-factor authentication systems such as RSAs SecurID for Windows, compliance becomes almost a piece of cake. /zimages/4/28571.gifClick here […]

RSA Sign-On Manager 4.5 Allows More Flexibility

With RSA Sign-On Manager 4.5, security giant RSA Security Inc. has re-entered the enterprise single-sign-on arena after a short hiatus. Click here to read the full review of RSA Sign-On Manager 4.5. 2 With RSA Sign-On Manager 4.5, security giant RSA Security Inc. has re-entered the enterprise single-sign-on arena after a short hiatus. Although two-factor-token […]

Be Smart About WMF Remediation

One way to remedy Microsoft Corp. Windows insecure handling of WMF graphics files is to go machine-by-machine and unregister the regsvr32 DLL that is at the root of the problem. However, until an effective patch is released or anti-virus vendors release signature files that catch the growing number of malicious files resulting from this vulnerability, […]

Stronger Sense of Identity

Forces external to enterprises combined to renew focus on identity management this year. These included an increase in phishing e-mail scams and government regulation, combined with maturing identity management products and refinement of industry technology standards. Many companies—including RSA, VeriSign, Oracle, Microsoft, Sun and Hewlett-Packard—either released new identity products or acquired identity technologies to bolster […]

Identity Management Is Here to Stay

Information about the Burton Groups June conference will become available in January, and IT managers who are serious about cutting user provisioning costs should put the San Francisco conference on their June calendars. Digital identity management, already a hot topic in 2005 because of regulatory requirements contained in SOX, HIPAA and GLB legislation, will only […]

Vulnerability Assessment Tool Filters False Positives

All vulnerability assessment tools initially create large numbers of false positives. Making the situation worse, its nearly impossible to correctly detect patch levels and operating system and application versions when no standard exists for the uniform reporting of this information. So its no surprise that, according to every vulnerability assessment tool weve ever seen in […]

StillSecure Vulnerability Tool Offers In-Depth Reports

Latis Networks Inc. has added vastly improved reporting capabilities to its StillSecure VAM 5.3, beefing up an already-capable network-based vulnerability assessment and management tool. Click here to read the full review of StillSecure VAM 5.3. 2 Latis Networks Inc. has added vastly improved reporting capabilities to its StillSecure VAM 5.3, beefing up an already-capable network-based […]

Altiris Cures UUHCs Image Deployment Woes

In the spring of 2003, the University of Utah Hospitals and Clinics faced a dilemma: A new hospital with 250 computers was coming online, but the image deployment system could handle only three to four clients at a time without failing. After looking at several solutions, UUHC, a full-service hospital and research center in Salt […]

Altiris Embraces VMware ESX

Altiris Inc.s Deployment Solution 6.5 creates disk images, distributes applications, provides remote control and executes scripted jobs on a variety of operating system platforms for servers and client systems alike. Click here to read the full review of Altiris Deployment Solution 6.5. 2 Altiris Inc.s Deployment Solution 6.5 creates disk images, distributes applications, provides remote […]

Reporting Fraud Should Be Easy

eWEEK was recently contacted by a reader who, by trying to do a good turn for PayPal (an eBay company), ended up spending several minutes of his time trying to figure out how to report a phishing e-mail message. To the reader, the task of reporting the problem took far too long and was much […]