October 06, 2004
$180 (five users)
- Ease of Use:
- Value for Money:
- Overall Rating:
Simple to install and use, with no excess baggage.
A script interface would ease installation and configuration tasks.
An unusual, but useful, product that can provide flexible, but secure, connections.
The netSurity Bridge system is unusual and hard to categorize. The software operates as client or server, depending on how and where it is configured. It does not provide access to a full desktop environment or to shared network resources, but it does provide an effective mechanism for accessing any TCP-based service through secure connections.
Installation is easy. The software has a simple user interface with two tabbed panels, which use a data grid to allow the user to select or enter data and create connections.
The software defines hosts as either listeners or destinations. Each link consists of a listener, an associated TCP port, a destination, also with an associated TCP port, and a type code which determines whether the link will be in plain text or encrypted. The destination must also be running a copy of the Bridge software, and must have a similarly defined link before communication can be established. The target system can define its destination as a service which it provides itself, or as a service provided on another host, which does not need to have the Bridge software installed.
The usage panel displays a graph of active sessions over time. This is more useful at the server end of a connection, because this is where performance is more critical.
The system was easy to configure to provide access to email and web services by defining the links and configuring the client's email program and web browser to use the appropriate host names and port numbers. However, it would help to simplify administration tasks if the software could be installed and configured from a script.
The system can be deployed in a number of ways. The simplest provides access between a remote system, perhaps a laptop, and a server, or between two VPN systems. However, because each Bridge can be configured to link to several systems, it is possible to devise quite complex linkages to provide secure communication for servers joined as part of a distributed application. This will interest anyone looking to provide secure distributed systems.
SC Webcasts UK
Information Security Manager
Infosec People - Hammersmith, West London
Junior Penetration Tester, Hertfordshire, to £35k + benefits
Infosec People - England, Hertfordshire
Cyber Security Architect
CYBER EXECS - London (Greater)
SOC Analyst, Aldershot, £47-56k + package
Infosec People - Hampshire, England, Aldershot
Senior Security Engineer
Loveworklife Recruitment - United Kingdom
Sign up to our newsletters
SC Magazine UK Articles
- Tesco Bank allegedly ignored warnings of hack from Visa
- Investigatory Powers and Digital Economy Bills could threaten economy
- Updated: A million German routers knocked offline by failed Mirai botnet attack
- Gooligan ad fraud malware infects 1.3M Android users, installs over 2M unwanted apps
- Microsoft update left Azure Linux virtual machines open to hacking
- SC Awards Europe 2016 winners announcements!
- ISIS radicalises 'lone wolves' through strong social media presence
- Updated: How will Brexit affect the cyber-security industry in UK and Europe?
- 9.2 million medical records for sale on darkweb
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- ICYMI: Tesco warned; IP Bill threatens economy; German routers offline; Azure trojan; Gooligan fraud
- Data centres are on the move - where will they end up?
- 90% of ITDMs believe IAM is crucial to digital transformation success
- Research: Hacked companies could see customer exodus if breached
- Misconfigured drive exposes locations of explosives used by oil industry