Deepnet Security UAP
February 01, 2009
- Ease of Use:
- Value for Money:
- Overall Rating:
- Strengths: Flexible, many user token options
- Weaknesses: Lacks reporting, auditing has to be exported for history and reports
- Verdict: Easy to use, interface simple to navigate, good value for the money. Nice solution if all you need is user management and configuration
Deepnet Security's Unified Authentication Platform is a single integrated security platform for provisioning, managing and verifying all types of user and host authentication methods. The software had several operating system dependencies and required us to load several modules before we could begin configuring and managing users.
This strong authentication solution is very easy to navigate, user-friendly for both the client and the administrative user. The server software supports both MS Windows Server and Linux operating systems. Once loaded, the web-based administration interface was launched to configure our users and provision our tokens. We were impressed with the ease of navigation within the management interface. As we moved down the left-hand navigation, our configuration options appeared in the centre pane, always keeping us just a few mouse clicks away from what we wanted next. It was easy to switch between configuring users, provisioning authentication options and looking at audit logs for troubleshooting.
The Deepnet Unified Authentication Platform has LDAP and AD integration, simplifying user provisioning and management. The token options were numerous, including hardware and software OTP tokens, grid cards, keystroke dynamics, voiceprint biometric and device authentication. We were also able to review the MobileID, which is able to transform a portable device into a one-time password (OTP) system, and QuickID, the SMS option for sending an OTP to a mobile.
Basic support is only 8/5 and includes email for the first month, a little light for an enterprise-style deployment. Upgraded support is not available and the website lacks support items such as a knowledgebase and FAQ section.
This was a good solution, with an easy-to-use management interface. Even though it only required the same amount of work as the other solutions to configure and manage users, it seemed to go faster and was less confusing. Auditing was available and helpful during initial installation and provisioning of users. For historical auditing or reporting on events, however, you would have to export your logs to a CSV file and use a third-party reporting facility.
SC Webcasts UK
Information Security Manager
Infosec People - Hammersmith, West London
Information Security Risk Manager, £45-55k + bens
Infosec People - West Midlands, England, Coventry
SOC Analyst, Aldershot, £55-63k + benefits
Infosec People - England, Aldershot, Hampshire
Security Architect, Cardiff - to £70k Basic
Infosec People - Cardiff, Wales
Interim CISO (Chief Information Security Officer) - Cyber Security Director
CYBER EXECS - London (Central), London (Greater)
Sign up to our newsletters
SC Magazine UK Articles
- Gooligan ad fraud malware infects 1.3M Android users, installs over 2M unwanted apps
- Met Police grab suspect with phone unlocked to get hold of data
- Cyber-security must reflect risk not just regulation
- Data centres are on the move - where will they end up?
- Same fate befalls Post Office broadband as hit DT?
- SC Awards Europe 2016 winners announcements!
- ISIS radicalises 'lone wolves' through strong social media presence
- Updated: How will Brexit affect the cyber-security industry in UK and Europe?
- 9.2 million medical records for sale on darkweb
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- Former Expedia IT employee admits to hacking execs from the inside
- Cyber-insurance: What will you be able to claim for and is it worth it?
- Levelling the playing field against targeted attacks
- India Supreme Court calls on tech giants to curb sexual assault, cyber-crime
- IoTSF conference: EU should become de facto regulator