Stephen Cooper

Stephen Cooper

Stephen Cooper has taken a close interest in online security since his thesis on Internet encryption in the early 90s. That formed part of his BSC (Hons) in Computing and Informatics at the University of Plymouth. In those days, encapsulation techniques were just being formulated and Cooper kept an eye on those methodologies as they evolved into the VPN industry. Cooper went on to study an MSC in Advanced Manufacturing Systems and Kingston University. He also holds an MSc Advanced Security and Digital Forensics from Edinburgh Napier University.

Cooper worked as a technical consultant, sitting DBA exams and specializing in Oracle Applications. With a long experience as a programmer, Cooper is able to assess systems by breaking into programs and combing through the code. Knowledge of IT development and operations working practices helps him to focus his reviews on the attributes of software that are really important to IT professionals.

After working as an IT consultant across Europe and the USA, he has become adept at explaining complicated technology in everyday terms. He is a people person with an interest in technology

Articles by Stephen

Logging your company’s assets is a start, but the field of ITAM is a lot more sophisticated than that. We'll show you the best tools to help your ITAM tasks.
By Stephen Cooper in Net Admin on February 11, 2025
Trellix Endpoint Security (formerly McAfee) and CrowdStrike Falcon are leading endpoint security solutions, with Trellix focusing on comprehensive threat prevention and detection, while CrowdStrike excels in real-time monitoring and advanced threat intelligence.
By Stephen Cooper in Net Admin on March 5, 2025
When you look for software, you probably narrow down your options to a few promising alternatives and then compare them against each other to decide which will go through to the final round. If you have ESET Endpoint Security and CrowdStrike Falcon on your shortlist to protect your endpoint devices, then this review will help you to compare the two.
By Stephen Cooper in Net Admin on February 3, 2025
Choosing security software for your business is a stressful task. There are many different products to consider and you can’t possibly evaluate all of them. Get your list down to five candidates and then reduce it down to two. If you’ve decided to compare SentinelOne to CrowdStrike Falcon, we’ve done the hard work for you.
By Stephen Cooper in Net Admin on April 6, 2022
Sophos Intercept X Endpoint Protection is the classic advancement of typical antivirus systems; it is an AV plus. By keeping antivirus at the heart of its solution, Sophos has stuck with a cybersecurity solution that the general public understands. It added host-based intrusion prevention systems to update the AV model rather than replace it.
By Stephen Cooper in Net Admin on March 10, 2025
Tanium Protect was an endpoint protection package that is no more. The platform was the product of some exceptionally clever cybersecurity specialists who, unfortunately, overlooked the fundamentals of system protection in the service’s design.
By Stephen Cooper in Net Admin on March 10, 2025
Nessus Vulnerability Scanner by Tenable is a growing challenger in the cybersecurity market. It has been dubbed an industry leader by some cybersecurity analysts, but it is still not a well-known name and its sales don’t match those of industry giants, such as Trend Micro and Symantec. Find out more about this system protection package.
By Stephen Cooper in Net Admin on January 14, 2025
Read our full review Symantec's Endpoint Protection solution, how the company's approach and products have evolved over the decades, their pivot from mainframes to PCs, their use of AI for achieving near real-time results, and who their main rivals are.
By Stephen Cooper in Net Admin on March 5, 2025
We look at breach detection systems and solutions, provide in depth reviews of the top tools. We also explore how they differ from IPS & IDS systems.
By Stephen Cooper in Net Admin on February 3, 2025
Page 56 of 71