MXI Security Stealth MXP
February 01, 2009
Starting at £115 for 1GB
- Ease of Use:
- Value for Money:
- Overall Rating:
- Strengths: Easy to use, secures removable media with strong AES, attractive price
- Weaknesses: No added desktop security
- Verdict: Limited offering, but very good at what it does. Nice for securing removable media and adding strong authentication to web-based apps
For organisations challenged with securing removable media, the Stealth MXP provides an easy-to-use answer. The product shipped to us as a USB drive but with some added features. The first was a biometric fingerprint scanner installed on the USB storage device. The product is designed to provide both two-factor authentication for secure portable storage (biometric with hardware fingerprint matching and strong password) and three-factor authentication for digital identity applications (biometric, password and device).
The device came out of the box with everything we needed to get it up and running quickly. There was no software to load on the PC. The USB contained a secure read-only partition with required software for configuring it. We were able to install and configure the device from our test user account without requiring admin privileges on our test PC. The pop-up interface walked us right through the configuration and training for our biometric profile.
The device we tested came configured to support multi-factor authentication for a web single sign-on to a public internet site, secure login to Outlook Web Access and a secure VPN connection to a back-end Citrix server. Stealth MXP lets you store credentials and launch a portable browser residing in the read-only partition, providing secure, automatic authentication to many types of web-based logins.
The client-side option worked much the same way as our pre-configured Outlook Web Access login page. Again, the credentials were stored in the read-only partition, providing secure access while bypassing the initial login prompts, allowing the user to go directly into their inbox.
The VPN login came pre-configured with an RSA Token on the device. Importing and managing tokens was very easy using the user interface. With a click of the mouse, we were able to authenticate to the VPN and back-end Citrix server, all without entering multiple credentials.
The device provides portable security for those travelling or using non-trusted devices. The Stealth device did not require administrative access but it will require access to an active USB port. This is a very nice solution for home users or enterprises that connect users through VPN and web-based portals.
SC Webcasts UK
Information Security Manager
Infosec People - Hammersmith, West London
Junior Penetration Tester, Hertfordshire, to £35k + benefits
Infosec People - England, Hertfordshire
Cyber Security Architect
CYBER EXECS - London (Greater)
SOC Analyst, Aldershot, £47-56k + package
Infosec People - Hampshire, England, Aldershot
Senior Security Engineer
Loveworklife Recruitment - United Kingdom
Sign up to our newsletters
SC Magazine UK Articles
- Tesco Bank allegedly ignored warnings of hack from Visa
- Investigatory Powers and Digital Economy Bills could threaten economy
- Updated: A million German routers knocked offline by failed Mirai botnet attack
- Gooligan ad fraud malware infects 1.3M Android users, installs over 2M unwanted apps
- Microsoft update left Azure Linux virtual machines open to hacking
- SC Awards Europe 2016 winners announcements!
- ISIS radicalises 'lone wolves' through strong social media presence
- Updated: How will Brexit affect the cyber-security industry in UK and Europe?
- ICYMI: CEO Sacked; MS Zero-day; Passwords dropped; Ransomware wild, charging hack
- 9.2 million medical records for sale on darkweb
- ICYMI: Tesco warned; IP Bill threatens economy; German routers offline; Azure trojan; Gooligan fraud
- Data centres are on the move - where will they end up?
- 90% of ITDMs believe IAM is crucial to digital transformation success
- Research: Hacked companies could see customer exodus if breached
- Misconfigured drive exposes locations of explosives used by oil industry