author-image

Stephen Cooper

Stephen Cooper has taken a close interest in online security since his thesis on Internet encryption in the early 90s. That formed part of his BSC (Hons) in Computing and Informatics at the University of Plymouth. In those days, encapsulation techniques were just being formulated and Cooper kept an eye on those methodologies as they evolved into the VPN industry. Cooper went on to study an MSC in Advanced Manufacturing Systems and Kingston University. He also holds an MSc Advanced Security and Digital Forensics from Edinburgh Napier University.

Cooper worked as a technical consultant, sitting DBA exams and specializing in Oracle Applications. With a long experience as a programmer, Cooper is able to assess systems by breaking into programs and combing through the code. Knowledge of IT development and operations working practices helps him to focus his reviews on the attributes of software that are really important to IT professionals.

After working as an IT consultant across Europe and the USA, he has become adept at explaining complicated technology in everyday terms. He is a people person with an interest in technology

Articles by Stephen

Who needs an RMM? What is an RMM, anyway? Are RMMs essential for managed service providers or would they be better off with other tools? We investigate.
By Stephen Cooper in Net Admin on April 11, 2024
Patching will update operating systems and software packages, but how does that process happen? We look at how RMM tools manage the task.
By Stephen Cooper in Net Admin on April 11, 2024
If you are interested in FireEye cybersecurity products, you should be looking for Trellix, which is the new name for FireEye. Compare the Trellix system with a major rival – CrowdStrike Falcon XDR.
By Stephen Cooper in Net Admin on April 12, 2024
CrowdStrike and Cylance both use machine learning and AI techniques to protect endpoints. Find out the similarities and differences between these two cybersecurity providers.
By Stephen Cooper in Net Admin on April 12, 2024
Both CrowdStrike and Tanium offer cloud platforms of cybersecurity tools. You can select modules from each platform to piece together your system.
By Stephen Cooper in Net Admin on April 11, 2024
NetApp is a world leader in network storage solutions and if you have one of these innovative devices, you will need to get a system monitoring tool that can interact with the NetApp devices.
By Stephen Cooper in Net Admin on April 11, 2024
Storage servers are essential for most businesses, whether they are physical servers on-premises or virtual storage services on the cloud. Find out the best systems to monitor these essential systems.
By Stephen Cooper in Net Admin on April 11, 2024
HCL AppScan is a package of application security testing systems. If you run a DevOps operation, you might need this system.
By Stephen Cooper in Net Admin on April 9, 2024
The CrowdStrike Falcon system is a platform of system security services. Find out whether this package will suit your needs.
By Stephen Cooper in Net Admin on April 8, 2024
Page 2 of 56