Stephen Cooper

Stephen Cooper

Stephen Cooper has taken a close interest in online security since his thesis on Internet encryption in the early 90s. That formed part of his BSC (Hons) in Computing and Informatics at the University of Plymouth. In those days, encapsulation techniques were just being formulated and Cooper kept an eye on those methodologies as they evolved into the VPN industry. Cooper went on to study an MSC in Advanced Manufacturing Systems and Kingston University. He also holds an MSc Advanced Security and Digital Forensics from Edinburgh Napier University.

Cooper worked as a technical consultant, sitting DBA exams and specializing in Oracle Applications. With a long experience as a programmer, Cooper is able to assess systems by breaking into programs and combing through the code. Knowledge of IT development and operations working practices helps him to focus his reviews on the attributes of software that are really important to IT professionals.

After working as an IT consultant across Europe and the USA, he has become adept at explaining complicated technology in everyday terms. He is a people person with an interest in technology

Articles by Stephen

Remote monitoring and management (RMM) systems have transformed the field of IT asset management. These systems can be expensive, so we have investigated free packages that work as well as the paid services.
By Stephen Cooper in Net Admin on April 11, 2024
RMM tools provide remote monitoring and management functions. They offer bundles of tools, but could you just buy the elements instead? Could you create your own RMM for less? We investigate.
By Stephen Cooper in Net Admin on April 11, 2024
Who needs an RMM? What is an RMM, anyway? Are RMMs essential for managed service providers or would they be better off with other tools? We investigate.
By Stephen Cooper in Net Admin on April 11, 2024
Patching will update operating systems and software packages, but how does that process happen? We look at how RMM tools manage the task.
By Stephen Cooper in Net Admin on April 11, 2024
If you are interested in FireEye cybersecurity products, you should be looking for Trellix, which is the new name for FireEye. Compare the Trellix system with a major rival – CrowdStrike Falcon XDR.
By Stephen Cooper in Net Admin on April 12, 2024
CrowdStrike and Cylance both use machine learning and AI techniques to protect endpoints. Find out the similarities and differences between these two cybersecurity providers.
By Stephen Cooper in Net Admin on April 12, 2024
Both CrowdStrike and Tanium offer cloud platforms of cybersecurity tools. You can select modules from each platform to piece together your system.
By Stephen Cooper in Net Admin on April 11, 2024
NetApp is a world leader in network storage solutions and if you have one of these innovative devices, you will need to get a system monitoring tool that can interact with the NetApp devices.
By Stephen Cooper in Net Admin on November 26, 2024
Storage servers are essential for most businesses, whether they are physical servers on-premises or virtual storage services on the cloud. Find out the best systems to monitor these essential systems.
By Stephen Cooper in Net Admin on October 29, 2024
Page 10 of 64