February 01, 2003
- Ease of Use:
- Value for Money:
- Overall Rating:
Scalable, easy to configure, useful authentication from user perspective and administration.
The pdf documentation; I think it's still printing now (or did we run out of ink?).
Manuals aside, this solution is a complete one for both network and user, with a variety of choices for the administrator and a few easy-to-use authentication token and smartcard options with PIN for the user.
In this Group Test we look at software solutions and hardware products which provide the means to access networks remotely, enabling security to be maintained when someone comes calling asking to be allowed in. Here we have a combination of an authentication software enabler and the means to access remotely using tokens and cards designed to ensure security levels are maintained.
The software, CRYPTOAdmin, is an authentication server and the backbone of the whole remote access solution. When combined with CRYPTOCard tokens and smartcards it provides a strong basis for remote access from anywhere in the world.
The software sits on the network so that the administrator can control who can access the system. Across a large organization administrators can be given service rights, which are specific to the groups or individuals they govern. This granular approach ensures that the workload is distributed and the group administrator only has the rights and privileges required to undertake his or her specific task. Users do not have to concern themselves with any software installation, indeed all they require is their CRYPTOCard token or smartcard to initiate a successful session, and of course their PIN. This simplifies the user experience and ensures that security is kept at its optimum capacity.
Installation is accomplished at network level by the security administrator. With the software provided on CD it is a fairly simple process - except for the retrieval of pdf documentation from their web site. This takes a lot of printing since color slides are used. This is a time- consuming and a print-ink-greedy act that we particularly disliked. However, the actual installation was not so bad, and had we known that we would be handheld through each stage by the installation wizard we might well have given the manual a miss altogether.
The server and client should be initially installed on the same computer to ensure it is working smoothly, and your choice of components can be added as you install by following the on-screen prompts. No rocket science here.
Once up and running you have a scalable and extremely useful authentication model, which can be configured easily, choosing groups to add users to by following a tree-like structure.
It worked well, which is the main thing, and the security it offered was very good. Let's hope they resolve the wasted ink problem on the printing of the dreaded pdf manuals, though following our comments we have been promised manuals in pdf format on the installation CD and hard copies of the quick start guide.
SC Webcasts UK
Information Security Manager
Infosec People - Hammersmith, West London
Junior Penetration Tester, Hertfordshire, to £35k + benefits
Infosec People - England, Hertfordshire
Cyber Security Architect
CYBER EXECS - London (Greater)
SOC Analyst, Aldershot, £47-56k + package
Infosec People - Hampshire, England, Aldershot
Senior Security Engineer
Loveworklife Recruitment - United Kingdom
Sign up to our newsletters
SC Magazine UK Articles
- Tesco Bank allegedly ignored warnings of hack from Visa
- Investigatory Powers and Digital Economy Bills could threaten economy
- Updated: A million German routers knocked offline by failed Mirai botnet attack
- Gooligan ad fraud malware infects 1.3M Android users, installs over 2M unwanted apps
- Microsoft update left Azure Linux virtual machines open to hacking
- SC Awards Europe 2016 winners announcements!
- ISIS radicalises 'lone wolves' through strong social media presence
- Updated: How will Brexit affect the cyber-security industry in UK and Europe?
- 9.2 million medical records for sale on darkweb
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- ICYMI: Tesco warned; IP Bill threatens economy; German routers offline; Azure trojan; Gooligan fraud
- Data centres are on the move - where will they end up?
- 90% of ITDMs believe IAM is crucial to digital transformation success
- Research: Hacked companies could see customer exodus if breached
- Misconfigured drive exposes locations of explosives used by oil industry