Using applications whitelisting with CoreTrace Bouncer

My latest video screencast is looking at Bouncer from CoreTrace. They have a new software-only version 6 that provides solid endpoint protection by only allowing vetted applications to run across your enterprise. There are agents for all 32-bit versions of Windows since 2000 and 64-bit Windows 7 and Server 2008.

CoreTrace Bouncer. Pricing begins at $35 per endpoint

Here is the link to the video review.

How to write a stellar computer product review

Let’s say you are a college student taking journalism and your assignment is to write a review of some computing product or service. What do you do? To get things started, here are a few suggestions from someone who has been writing such reviews for more than 20 years, publishing hundreds of them in dozens of IT trade publications and Web sites.

Make sure you have the most up-to-date product version. This seems obvious, but there are many download sites that don’t make it easy for you to determine this. Make sure you are testing a shipping version too: the differences these days between beta and final versions are very blurry (remember Gmail was in “beta” for several years).  And if you are testing some Web service, realize that the code that you test today will change tomorrow, so it is important to check back when you finish review (if some time has elapsed) to make sure that you cover the new features that were recently added. I know, the Web makes for a moving target.

Go to the vendor’s Web site, collect information such as system requirements (which version of Windows, with what Service Pack and what version of .Net Framework and Internet Explorer) and make sure you have a PC that can run the software you downloaded or work with the particular hardware.  If you are testing a network product, make sure you have at least a server and a client or two for your tests. Also find the current pricing information (this is usually the hardest thing to discover), and call the PR contact listed for the company (if indeed it is listed) and tell them you are going to be reviewing the product. You could ask them for a special tech support engineer to resolve any issues, depending on the product and your own level of comfort.

Some professional reviewers shun special tech support, I find it useful especially if you are stuck with a problem that is entirely of your own ignorance and you are trying to resolve the issue and get your review finished.

Don’t write about your installation experience. Even if it was onerous, your readers don’t care. They want to know what the product does. Just get straight into the review. If you must carp about the install, write the graf and then delete it before your final edit to get it out of your system.

Give us a nut graf that sets expectations of who uses what and why. See the first graf of this screed as an example: I tell you who should read this piece and why I am qualified to write it.Most of the times this is the second graf of your review: “Microsoft’s new cloud-based thing is aimed at engineers who can understand how to configure routers in their sleep, but isn’t yet ready for the general IT population.”

Understand the context of where the product fits into your reader’s computing ecosystem. If it is a cloud-based Web application, does anyone use similar premises-based applications of equivalent functionality? Why or why not? If you don’t know the context, this would be a good time to talk to a few IT folks to get some idea of how they intend to use the product, or drawbacks in similar products that they are trying to avoid.

What breaks or doesn’t work when you try to use a Mac or Linux machine? Not everyone uses Windows PCs, you know. Dealing with a mixture of endpoints is part of the challenge of any modern IT department. Same is true for a variety of browsers. Make sure your test plan is rich enough to include these variations.

When you get some unexpected result, it is polite to call the vendor and let them know. It could be something you did. Or didn’t do. They could have a fix coming for this situation, something you might want to tell your readers about. Or you could have found a real honest-to-goodness bug. It happens.

Take copious screenshots for your own reference, as well as for ultimate publication. I prefer to use TIFFs because you can preserve higher-resolution screens. I then create a private photo album on Picasa or Flickr that I upload the screens to and link in my article so my editor can pick the ones that s/he likes. Having this record can be useful if you are going to get paid to write another article for a different publication down the road, because you won’t have to go back and try to re-create your test bed.  Windows 7 (Snap) and Mac OS (Grab) come with built-in utilities to take screenshots. Oh, and include captions on all of your screenshots too.

Look at the previous version, or at least the press release, to understand what is new and shiny and different about the current version. What did the vendor add, why did they add it, and what does that mean for users of the legacy product?

Look at the competition too. If you don’t know which products are competitors, you can ask your friendly vendor PR person. If the vendor tells you that they have no competitors (they often like to say that) and you know this not to be the case, don’t be afraid to call them out on it.

If you don’t know how to use desktop virtualization technologies, now is the time to learn. Virtual machine products such as VMware have made the product reviewer’s job a lot easier. When I began in this business, I had a room full of PCs that were setup for different situations. Now I have a hard disk filled with VMs of different operating systems, and when it is time to test something, I can make a copy from my clean master and not have to worry about reinstalling the OS if something goes south.

Email your PR contact when the review is published. These days, almost everyone has set up Google alerts but you want to show that you care. Thank them for their help, even if they were less than forthcoming. You want to build up a relationship with these folks. Don’t be afraid to enter into a dialogue with the vendor to explain your point of view and take the time to listen to where they think you missed the boat.

Good luck with your reviews and feel free to share here some of your own tips.

For a more detailed missive on how PR people should deal with the press from the press’ perspective, see the very excellent “Care and Feeding of the Press” by Esther Schindler here.

SearchEnterpriseDesktop: Blocking USB access

A rogue employee can easily carry a lot of private data out of your offices using a USB drive. While gluing your USB ports shut (like my local library did) is one way to prevent data loss via a portable drive, a less drastic — but just as efficient — option is a security or desktop management product.

I look at how five different products can disable USB devices in a story this week for TechTarget here.

Computerworld: How to prevent data from leaving your network

Data loss prevention (DLP) is an emerging field with a lot of different products and players. The idea is to stop information from leaving your internal networks in close to real time, so you can identify the leaker or thief before too much damage (and ensuring lawsuits) happen. I look more closely at three different DLP products from BlueCoat, Global Velocity, and Sendmail to show you what is involved in setting these up in a story today posted on ITworld.

ITworld: How to run IE v6 on Windows 7

One of the challenges faced by IT managers in upgrading their desktop fleets to Windows 7 is in supporting older Web applications that only run on Internet Explorer v6, rather than the pre-installed IE 8 that comes with Windows 7. It isn’t a simple fix.

I show how three products — VMware’s ThinApp, Symantec’s Workspace Virtualization, and InstallFree Bridge Enterprise — can handle this situation in a story for ITworld here.

SearchEnterpriseDesktop: Controlling Facebook apps across the enterprise

Controlling employee use of social networking sites is becoming more of a challenge for IT managers. According to Facebook, at any given moment, about 30 million people are playing Farmville and other games across its network. Earlier this year, an Army grunt posted the location of his next mission in Afghanistan on his Facebook status page, and within moments, the mission was scrubbed and the soldier was being sent back home. Several products and strategies can help you control enterprise apps and I review a variety of approaches in my story for Techtarget here.

SearchVirtualDesktop: Virtualization tools for running legacy applications on Windows 7

An increasing number of companies are considering upgrading to newer versions of Internet Explorer (IE) and Windows. But many administrators have the same question: How do I upgrade my desktops and support legacy Web applications that rely on IE v6 and other older technologies? There are several solutions, which I go into detail about in this story for Techtarget here.

Cure for wet cell phones

Most of us know of someone who has dropped their cell phone into water and suffered the consequences. I am hear to tell you that there is an inexpensive solution, called a Bheestie Bag. It costs $20 (plus shipping). It is a bag that contains some desiccant to dry out the phone. You put the wet phone into the bag for a day or so and the moisture is absorbed from the phone. I tried it on a neighbor’s phone over the weekend and they got their phone back into working condition within about 40 hours inside the bag.

External hard drive connectors

I test a lot of different products here, and over the years I have developed a simple collection of keeping a stack of different hard drives to plug into various test PCs. Sometimes I need to quickly check something on one of them, and an easy way is to use a hard drive external connector product to hook it up to a USB port and grab the files that way.

These connectors are also useful in computer forensics since you don’t have to boot or otherwise touch the hard drive to view the files on it. If you are trying to bring back a PC from the dead this is also a useful tool to have around.

For the past year or so I have been using the Newer Technology USB 2.0 Universal Drive Adapter, a collection of cables and connectors for $35 that can connect any SATA or IDE drive to your PC. It works on both Windows and Macs, has connectors for both regular 40-pin ATA drives and the 44-pin mini notebook drives.

I also took a look at the Cirago Hard Drive Docking Station USB 3.0. For $50, you get a dock that you can insert your SATA drive in, no messing with cables. I couldn’t get it to recognize a 64-bit Windows drive, and it took a while for Windows to recognize the mass storage media before it would be accessible in Windows Explorer. And if you have a USB 3 port, it will run closer to the drive speeds too. It also looks pretty cool.