ACL for Windows
August 01, 2003
ACL Services Ltd.Product:
- Ease of Use:
- Value for Money:
- Overall Rating:
Powerful and fast auditing analysis tool for spotting fraud, waste and errors.
Needs an advanced user to get the most out of it.
This feature-packed application makes it a must-have for the systems administrator.
The software we received for this test was a pre-release of version 8, but initial observations tell us that any tweaks before the final version will probably be very minor ones.
New in this version are terminology changes to make the software more user-friendly, console enhancements and integration with Crystal Reports. This will allow templates generated by the program to be used by the full version of Crystal Reports.
The main objective of the application is to analyze data garnered from other sources to pinpoint trends and other activity, notably fraudulent practices and inefficient usage of inventory, and error tracking. The data extracted from source is not manipulated or altered in any way, just analyzed to show a clearer picture of what is happening in the enterprise.
Installation was uncomplicated, requiring only an install of an XML runtime before the main application. The hardware requirements are pretty light so the product really flew when we started it up for the first time.
As this was a pre-release no manuals were provided although normally they would be. However, this version, like previous ones, requires a dongle to be fitted to the parallel port of the machine the software would reside on.
On firing up the console the screen is split into two main parts. On the left hand side resides the project navigator. Facing that is the display area where the package shows output, graphs and data views. Data can be taken from a variety of sources and one thing that sets it apart from the others in the test is the ability to extract data from IBM S/390 mainframes.
The software allows network administrators to pinpoint areas worth further investigation, screening out data to uncover problem areas. It does this by using Benford's Law to look for anomalous numbers and possible fraud. An example of this is to look for any unit hardware costs that are less than zero. We could quickly filter out these irregularities to inspect.
This provides an excellent tool of those who wish to make sure of the validity of data acquired from different sources. However we are unconvinced by claims that a novice user could produce useful analysis and reports. We believe that this is a powerful weapon in the hands of those who know what to do with it and all the features it possesses.
SC Webcasts UK
Information Security Manager
Infosec People - Hammersmith, West London
Junior Penetration Tester, Hertfordshire, to £35k + benefits
Infosec People - England, Hertfordshire
Cyber Security Architect
CYBER EXECS - London (Greater)
SOC Analyst, Aldershot, £47-56k + package
Infosec People - Hampshire, England, Aldershot
Senior Security Engineer
Loveworklife Recruitment - United Kingdom
Sign up to our newsletters
SC Magazine UK Articles
- Tesco Bank allegedly ignored warnings of hack from Visa
- Investigatory Powers and Digital Economy Bills could threaten economy
- Updated: A million German routers knocked offline by failed Mirai botnet attack
- Gooligan ad fraud malware infects 1.3M Android users, installs over 2M unwanted apps
- Microsoft update left Azure Linux virtual machines open to hacking
- SC Awards Europe 2016 winners announcements!
- ISIS radicalises 'lone wolves' through strong social media presence
- Updated: How will Brexit affect the cyber-security industry in UK and Europe?
- 9.2 million medical records for sale on darkweb
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- ICYMI: Tesco warned; IP Bill threatens economy; German routers offline; Azure trojan; Gooligan fraud
- Data centres are on the move - where will they end up?
- 90% of ITDMs believe IAM is crucial to digital transformation success
- Research: Hacked companies could see customer exodus if breached
- Misconfigured drive exposes locations of explosives used by oil industry