Cameron Sturdevant

About

Cameron Sturdevant is the executive editor of Enterprise Networking Planet. Prior to ENP, Cameron was technical analyst at PCWeek Labs, starting in 1997. Cameron finished up as the eWEEK Labs Technical Director in 2012. Before his extensive labs tenure Cameron paid his IT dues working in technical support and sales engineering at a software publishing firm . Cameron also spent two years with a database development firm, integrating applications with mainframe legacy programs. Cameron's areas of expertise include virtual and physical IT infrastructure, cloud computing, enterprise networking and mobility. In addition to reviews, Cameron has covered monolithic enterprise management systems throughout their lifecycles, providing the eWEEK reader with all-important history and context. Cameron takes special care in cultivating his IT manager contacts, to ensure that his analysis is grounded in real-world concern. Follow Cameron on Twitter at csturdevant, or reach him by email at [email protected].

Reviving the Perimeter

In 2006, network software and hardware vendors will continue to build new barn doors to make sure that when the horses return, in the form of endpoint devices including laptops and PDAs, only those not compromised with viruses or vulnerable configurations are allowed to access network resources. Re-establishing the network perimeter is a laudable goal, […]

One Good Turn Deserves Better

eWEEK was recently contacted by a reader who, by trying to do a good turn for PayPal, an eBay Inc. company, ended up spending several minutes of his time trying to figure out how to report a phishing e-mail fraud. To the reader, the task of reporting the problem took far too long and was […]

Sample RFP: Access Control

An RFP for an end-user network access control solution should be guided by knowledge of the types of laptops, handhelds and PCs that are already in use, combined with a thorough assessment of the capabilities of the existing network infrastructure. A solution should work with all end-user devices and fill in any security gaps that […]

LANDesk Tightens Rules for Access

LANDesk Software Inc.s LANDesk Security Suite 8.6 is a much more significant release than the version number implies. IT managers who are looking for a way to scan end-user systems for both correct configuration and the presence of malware should add LANDesk Security Suite to their list of possible options. Click here to read the […]

Access Initiatives Test Limits

Whats the best way to limit network access to approved, correctly configured and malware-free end-user devices? Cisco Systems Inc., Microsoft Corp. and an industry association called the Trusted Computing Group—along with network equipment makers including Extreme Networks Inc., Juniper Networks Inc. and Vernier Networks Inc.—are trying very hard to answer that question. The current state […]

Vernier Unites Security

Vernier Networks Inc.s EdgeWall 7000 Rx is an effective network access management appliance that slips into disparate network authentication and authorization infrastructures to bring unity and greater security to midsize and large enterprises. Click here to read the full review of EdgeWall 7000 Rx. 2 Vernier Networks Inc.s EdgeWall 7000 Rx is an effective network […]

SSL VPN Targets SMBs

Watchguard Technologies Inc.s Firebox SSL Core with Citrix Systems Inc.s Citrix Secure Access is a good Secure Sockets Layer VPN solution for small and midsize businesses that want ease of use for remote users who need access to secure network resources. Click here to read the full review of Watchguards Firebox SSL Core. 2 Watchguard […]

Symantecs ISTR Makes Some Good Points

Even though Symantec has a vested interest in painting as bleak a security picture as possible, its latest Internet Security Threat Report does a good job of providing a well-researched overview of everything bad on the Internet. The ISTR, compiled by a team of Symantec experts, uses mountains of data collected by the company from […]

Real Tools Handle Virtual Jobs

Managing virtual servers and network infrastructure requires real management systems. Fortunately, many of the tools IT managers use today will work just fine with many virtual systems. However, based on testing at eWEEK Labs, weve come across some management areas that will require some extra thought. Well deal with two of the most obvious questions. […]

BMC Corrals VMWare Systems

BMC Software Inc.s BMC performance Manager for Virtual Servers helps companies accurately gauge the performance of both real and virtual systems. Click here to read the full review of BMC Performance Manager for Virtual Servers. 2 BMC Software Inc.s BMC performance Manager for Virtual Servers helps companies accurately gauge the performance of both real and […]