In the case of USB security, we found two interesting things. First, what we thought we meant by USB security has, actually, become hidden in what we refer to generally as endpoint security. Second, as ever, vendors are taking a broad view of product categories. This certainly was the case with USB security where we saw everything from full-blown enterprise management tools for security at the endpoints to auto-encrypting USB thumb drives.
Relative to wireless security we ran afoul of the numerous standards that define the wireless landscape. Justin examines those standards and explains them to us in the context of testing the various wireless security tools that passed through the labs this month.
The overriding impression that I had while overseeing this month's reviews is — and I've alluded to this before — that of an industry on the move. The USB security products Mike and I tested almost universally were not restricted to USB security, for example. Rather they have begun to encompass security for all types of endpoint security. Even the USB memory sticks that we examined have addressed the number one problem for data at rest: sensitive data in clear text on an extremely portable device. These small, inexpensive products force encryption when data is saved to them. This is a cheap solution to a potentially very expensive problem.
The wireless security products are beginning, as the wireless industry is beginning, to show maturity. The products we looked at bring together management of wireless access points in a largely holistic manner. While addressing security, they also address the management of the access point devices. This is a major step in the maturity of the product group since we looked at it last.
These are exciting times in our field and there are huge opportunities.
We'll bring them to you in future reviews and First Looks as we find them.
— Peter Stephenson