Cameron Sturdevant

About

Cameron Sturdevant is the executive editor of Enterprise Networking Planet. Prior to ENP, Cameron was technical analyst at PCWeek Labs, starting in 1997. Cameron finished up as the eWEEK Labs Technical Director in 2012. Before his extensive labs tenure Cameron paid his IT dues working in technical support and sales engineering at a software publishing firm . Cameron also spent two years with a database development firm, integrating applications with mainframe legacy programs. Cameron's areas of expertise include virtual and physical IT infrastructure, cloud computing, enterprise networking and mobility. In addition to reviews, Cameron has covered monolithic enterprise management systems throughout their lifecycles, providing the eWEEK reader with all-important history and context. Cameron takes special care in cultivating his IT manager contacts, to ensure that his analysis is grounded in real-world concern. Follow Cameron on Twitter at csturdevant, or reach him by email at [email protected].

Prep Work Is Key to Accurate Network Tests

Half the work of testing a network configuration management tool such as AlterPoint Inc.s DeviceAuthority Suite 3.5 comes before the product is ever installed. /zimages/2/28571.gifClick here to read the review of DeviceAuthority Suite 3.5. IT managers must have a complete inventory of the make, model and operating system of all network devices, including switches, routers, […]

DeviceAuthority Brings Order to Changes

Configuring thousands of far-flung network devices is always a challenge for IT staff. AlterPoint Inc.s DeviceAuthority Suite 3.5 provides a well-integrated set of tools that leverages the companys knowledge of configuration syntax to let all levels of network operations staff create and distribute reliable configuration files quickly. Click here to read the full review of […]

Hacking Tools Can Strengthen Security

To avoid getting hacked, youve got to think like a hacker—and that means knowing the tools and tricks of the hacking trade. IT managers must understand the types of hacking tools available—including the vulnerabilities they target and the damage they can cause—to keep business data private, prevent information theft and maintain data availability while enabling […]

Anatomy of a Rootkit Hack

Last November, an eWEEK reader who is an IT executive at a large organization was notified by his companys help desk that the companys Microsoft Corp. Exchange e-mail servers had gone offline. Further investigation revealed that the Temp directory of the Exchange servers—along with other crucial directories and files—was suddenly missing. The result was 500GB […]

Thumbs Up for RollerMouse

I type a lot and am always looking for ways to avoid repetitive-stress symptoms. To this end, I recently gave up my wireless mouse in favor of a RollerMouse Pro from Contour Design. My wireless mouse made it super-easy to switch between right- and left-handed mouse operation—my usual method for avoiding repetitive stress in my […]

LANDesks Server Management Tool Is a Solid First Effort

LANDesk Software Inc.s latest offering, LANDesk Server Manager 8.5, builds on the companys already rock-solid desktop management tools, adding a small footprint and an on-demand agent that places almost no burden on the managed servers. Click here to read the full review of LANDesk Server Manager 8.5. 2 LANDesk Software Inc.s latest offering, LANDesk Server […]

Real Vulnerability Testing Tools Offer Actual Assessments, Not Just Hype

A good vulnerability assessment tool can stabilize the shifting terrain of threats to IT systems. But just about every configuration management, patch distribution and system monitoring tool these days comes with a “vulnerability assessment” utility, so IT managers face a challenge separating useful tools from creative marketing. The good news is that most of these […]

Qurb Dumps Junk Mail

Enough spam makes it through the corporate e-mail filter that I still use a desktop junk-mail blocker on my PC. Lately, Ive been using Version 3.0 of Qurbs namesake product. Qurb 3.0, which became available in February, costs $29.95 for an individual copy, and volume discounts are available. (If you want anti-spam capabilities plus rapid […]

Desktop DNA Eases Transfers

Computer Associates Unicenter Desktop DNA r11, released in January, is a handy way to transfer user PC information from one system to another. Ive used Unicenter Desktop DNA in the Labs to transfer personalized settings—including data files, e-mail address books, and preferences such as drive mappings and screen resolution—from one system to another. Desktop DNA […]

LANsurveyor Does Fast Assessments

The number of machines in my core test network rarely changes. So, Neon Softwares LANsurveyor 9.0, with a new Continuous Scan module that started shipping last month, made it easy for me to find systems that were added to the network without my knowledge and to scan the Windows machines for vulnerabilities. Small and midsize […]