Cameron Sturdevant

About

Cameron Sturdevant is the executive editor of Enterprise Networking Planet. Prior to ENP, Cameron was technical analyst at PCWeek Labs, starting in 1997. Cameron finished up as the eWEEK Labs Technical Director in 2012. Before his extensive labs tenure Cameron paid his IT dues working in technical support and sales engineering at a software publishing firm . Cameron also spent two years with a database development firm, integrating applications with mainframe legacy programs. Cameron's areas of expertise include virtual and physical IT infrastructure, cloud computing, enterprise networking and mobility. In addition to reviews, Cameron has covered monolithic enterprise management systems throughout their lifecycles, providing the eWEEK reader with all-important history and context. Cameron takes special care in cultivating his IT manager contacts, to ensure that his analysis is grounded in real-world concern. Follow Cameron on Twitter at csturdevant, or reach him by email at [email protected].

ZENworks 7.0 Hones Reporting, Integration

The Novell Inc. ZENworks 7.0 suite of server, desktop and handheld management tools has improved remote control, system imaging, hardware and software inventory, and automated policy management capabilities. Click here to read the full review of Novells ZENworks 7.0. 2 The Novell Inc. ZENworks 7.0 suite of server, desktop and handheld management tools has improved […]

Tools Offer Regulatory Road Map

IT managers are looking for any port in the regulatory mandate storm, and there is no shortage of vendors and consultants promising safe harbor. But IT managers must carefully vet the conformance peddlers now offering advice in the form of books, software-based assessment tools, Webinars and consulting. Indeed, a cottage industry has sprung up around […]

How to Avert Identity Crisis

Audits required by the Sarbanes-Oxley Act and other federal and state regulatory mandates are driving the latest interest in identity provisioning technology. Fortunately, a variety of tools are emerging that will help IT managers tame the complexities of enterprise ID management. Identity management tools such as Courion Corp.s Enterprise Provisioning Suite 7.2 and Trusted Network […]

ID Specs and Reality Checks for OASIS

IBM and Microsoft Corp., along with a small fleet of partners, will submit in September three new security specifications to OASIS: WS-SecurityPolicy, WS-SecureConversation and WS-Trust. The submission of these specifications continues a tradition, started in 2002, where IBM and Microsoft first announce the evolution of their Web services security work at Burton Groups Catalyst Conference […]

Courion Suite Shows Who Goes There

Courion Corp.s Enterprise Provisioning Suite 7.2 allows IT managers at midsize and large organizations to effectively manage user access while meeting internal and external auditors demands for an accurate accounting of who is using company systems and data. Click here to read the full review of Courion Enterprise Provisioning Suite 7.2. 2 Courion Corp.s Enterprise […]

Courion Locks Down Bank IDs

Courion Corp. identity management and provisioning tools have helped SunTrust Banks Inc. create staff efficiencies while reducing both data entry errors and the time needed to get new employees up and running. Atlanta-based SunTrust Banks has retail offices in the Southeast and mortgage and commercial offices throughout the United States. The bank employs about 33,000 […]

Identity 2.0 Fine-Tunes Access

Identity 2.0 from Trusted Network Technologies Inc. is an appliance and software combination that effectively controls access to servers and applications while also providing a good way to record user access for auditing purposes. Click here to read the full review of Identity 2.0. 2 Identity 2.0 from Trusted Network Technologies Inc. is an appliance […]

Real Research or a Marketing Ploy?

The impact of regulatory compliance on IT security is nearly impossible to measure accurately. However, a research survey launched on Aug. 24 by BindView Corp., The Institute of Internal Auditors and the Computer Security Institute purports to get a baseline assessment of just that. I think the survey results will be interesting—especially to auditors and […]

Identity Standards Rely on Trust Among Companies

The Liberty Alliance Project, a consortium that advocates for federated identity standards and identity-based Web services, last week announced the results of the first SAML 2.0 interoperability tests. Ill come back to the whys and wherefores of the tests in a moment. But the most important outcome of the tests likely has more to do […]

Get Ready for Y2Day

Earlier this month, Congress passed an energy bill that will extend daylight-saving time by about a month, starting in 2007. Hmm. An event of possibly monumental proportions—one that could have a huge impact on the way we live and work and on the systems on which we rely? Reminds me a little of Y2K. Organizations […]