Feeds
85%

Tom Clancy's Splinter Cell: Conviction

Classic territory

Secure remote control for conventional and virtual desktops

Splinter Cell ConvictionReview

Sam Fisher's sixth videogame outing, and his first in almost four years, marks a further refinement of the core principles of the Splinter Cell franchise. The real-world credibility provided by Clancy's endorsement remains intact, as does Sam's modus operandi of infiltrate, interrogate and assassinate. Even the story, although devoid of the geopolitics of previous entries, still resounds with murky government agencies, PMCs and EMPs.

What has changed, however, is something of a quiet revolution. By introducing a much greater sandbox approach to gameplay, Ubisoft had successfully broadened the series' appeal to a wider audience, one previously turned off by its traditionally punishing pedantics. Sure, the developers have tinkered with the core game mechanic of stealth before, especially apparent between the soul-destroyingly difficult Pandora Tomorrow and the more forgiving Chaos Theory, but Splinter Cell has never felt so accessible and, dare I say it, fun!

Whereas in previous games missing alarms, being caught in spotlights, or not concealing dead bodies, invariably meant game over, in all but one of Conviction's single-player levels such mistakes now result in far less finite outcomes: messy, frenetic gunfights against multiple hostiles.

That's not to say you'll always survive such gunfights - Sam Fisher is still no bullet sponge. But at least got a fighting chance to survive and continue the level uninterrupted.

In relaxing the rigidity of stealth, Ubisoft has also been careful not to alienate the series' hardcore fanbase. Stealth still remains the absolute best strategy. And while Conviction offers no particular reward for avoiding enemy guards altogether, there certainly is for killing them surreptitiously.

For every hand-to-hand kill, you're rewarded with a single burst of a new mode called Mark and Execute. Depending on the weapon in hand, you can tag up to four different targets. Once tagged and in range, markers turn red, signalling you're just one button press away from executing them with single, automated bullet-time shots.

Whose round?

Internet Security Threat Report 2014

Next page: Last Known Position

Whitepapers

10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Choosing a cloud hosting partner with confidence
Download Choosing a Cloud Hosting Provider with Confidence to learn more about cloud computing - the new opportunities and new security challenges.