Product Group Tests
Policy management (2006)October 01, 2006
Our Best Buy award goes to Security Center Lite as we feel it will be very useful in providing an easy-to-deploy, user-friendly vulnerability scanning capability at an affordable price, thus allowing smaller and medium- sized organisations to benefit from this functionality. Furthermore, a 30- day trial is available, allowing potential users to develop an understanding of the product before committing to a purchase.
For our Recommended award Airmagnet Enterprise 7 stands out as an innovative and truly useful product, designed to bring a level of assurance to wireless LANs equivalent to that enjoyed by the wired variety. This will be particularly welcomed by many users and organisations who have been rather worried about the proliferation of wireless technology from a security perspective.
Network security may be getting more complicated, but there are many tools to help you stay on top of things, whatever the size of your organisation. Julian Ashbourn gets to grips with a varied selection.
These days, networks, applications and their security have become quite a complex affair. There are all sorts of angles: access control, device configuration and protection, vulnerability scanning and remediation, policy creation and enforcement, regulatory compliance, intrusion detection, patch management and many other factors. All of these must be taken into consideration with respect to contemporary IT networks, and this trend is likely to continue.
Fortunately, recognition of this reality at board level has been more forthcoming in recent years, releasing resources for this critical area of operations. At the same time, we have seen the development and refinement of many useful tools and utilities to help take some of the laboriousness out of the work involved. In short, we are getting to grips with the perennial question of network security like never before, although, of course, we must never be complacent as, in many respects, the ultimate goal is something of a moving target, with new potential threats developing all the time.
Furthermore, network security administrators have a continuing task in keeping up to date with such developments, as well as the available technology with which to address them, which is also changing all the time. This "moving picture" has, of course, implications for an organisation's technical architecture, as changes in one area often have a knock-on effect in another. One must therefore choose such tools carefully and periodically review their fit within the general IT architecture and prevailing situation. Clearly, flexibility within such tools and how they might be deployed will be an important factor in this context. Similarly, an intuitive configuration, ease of deployment and general inter-operability will prove important as networks develop to accommodate ever changing IT estates and associated business requirements.
In this group test, we have a mixed bag of interesting products, including tools to protect wireless LANs, solutions to unify access across disparate operating systems, comprehensive network security models, utilities to review access entitlement across the enterprise, products that offer a simple security solution for small to medium-sized enterprises, tools to undertake vulnerability scanning and tools for policy management. Indeed, this assortment covers a fairly broad spectrum of potential situations and requirements. All of these products are genuinely useful and will deliver what they promise if configured and deployed properly.
The question for many will be: where do we stop? Any such tool brought into the organization will have its own, ongoing support issues and costs, and may add complexity to the overall deployed product portfolio and technical architecture. Security professionals must therefore be selective as to which functions they really need and how to provide them.
It may be that they can best achieve functionality in certain areas from within their own skills base, keeping things in-house and tightly managed, while for other functions, a purpose-designed tool might prove more suitable. They may already have certain tools in place that are working satisfactorily and whose functionality need not be duplicated.
In virtually all cases, it would be pertinent to develop an overall view and associated ongoing strategy, in order that products such as those featured here may be slotted in as and where necessary in order to meet a defined objective. This is, after all, the essence of good management. So how do these particular products stack up in this respect?
All of these test subjects had something interesting to offer in one way or another. We were particularly intrigued by the single-mindedness of approach of the Airmagnet Enterprise 7 and its focus on the protection of wireless LANs, as we appreciate that this is an area of concern to many. The Centrify Direct Control product will be especially welcomed by those seeking a unified and manageable access control approach across Unix, Linux, Windows and Mac clients.
The ID-Certify product will no doubt be welcomed with open arms by many struggling with regulatory compliance issues. The Security Center Lite product will introduce many to vulnerability scanning who may not have otherwise ventured into this area. The Solsoft Policy Server and Lockdown enforcer will similarly find ready homes, and the Global Command Center offers comprehensive network protection, scalable for large enterprises and capable of fine levels of control. They are all worthy products, deserving of a closer look by those seeking such functionality.
All products in this group test
SC Webcasts UK
Information Security Manager
Infosec People - Hammersmith, West London
Information Security Risk Manager, £45-55k + bens
Infosec People - West Midlands, England, Coventry
SOC Analyst, Aldershot, £55-63k + benefits
Infosec People - England, Aldershot, Hampshire
Security Architect, Cardiff - to £70k Basic
Infosec People - Cardiff, Wales
Interim CISO (Chief Information Security Officer) - Cyber Security Director
CYBER EXECS - London (Central), London (Greater)
Sign up to our newsletters
SC Magazine UK Articles
- Tesco Bank allegedly ignored warnings of hack from Visa
- Updated: A million German routers knocked offline by failed Mirai botnet attack
- Gooligan ad fraud malware infects 1.3M Android users, installs over 2M unwanted apps
- Cyber-security must reflect risk not just regulation
- Met Police grab suspect with phone unlocked to get hold of data
- SC Awards Europe 2016 winners announcements!
- ISIS radicalises 'lone wolves' through strong social media presence
- Updated: How will Brexit affect the cyber-security industry in UK and Europe?
- 9.2 million medical records for sale on darkweb
- Microsoft Office 365 hit with massive Cerber ransomware attack, report