April 08, 2005
- Ease of Use:
- Value for Money:
- Overall Rating:
Comprehensive set of encryption utilities.
It needs better integration auditing.
A very scalable, well-integrated encryption suite.
Control Break's SafeBoot offers a lot of features, but we were a bit put off by several being cited as available at an extra cost, including some basic-looking items such as a scripted administration tool, or a database backup utility.
Configuration involves several steps, but is so easy that we were almost surprised the installer does not automate more of it.
An object database is created, then a server configured to handle authentication. Machines are configured in groups, and users are then created and assigned to machines. The interface is clear and consistent throughout, and well laid-out.
PDAs are handled differently (as machines, rather than users), but that is the only anomaly. There is a lot of support for card readers and tokens, which must be set up from the start.
Once configured, installation sets are created for machines, which results in executable packages to be pushed out to those systems. We would rather see remote installation through network distribution or MSI files than executables. The executables, when run, install the client software and deploy policies.
SafeBoot provides all the basics for encryption – file, folder, and disk crypto. Where the software really shows its merit is in the flexibility and granularity of the backend object database. Objects can be encrypted against specific users or groups, any of which can access the secured data with the configured permissions.
In addition, the encryption can include a recovery public/private key pair, which can be stored separately for emergency access. Files can be securely wiped after encryption.
Each user, machine and server object keeps an audit log of activity, but we would have appreciated a way to consolidate these into a single interface.
Control Break has done a good job, providing a flexible, powerful object database which scales up into enterprise data encryption with surprising ease.
Coupled to integration with smartcard readers or authentication tokens, this would snap easily into two-factor authentication environments.
SC Webcasts UK
Information Security Manager
Infosec People - Hammersmith, West London
Junior Penetration Tester, Hertfordshire, to £35k + benefits
Infosec People - England, Hertfordshire
Cyber Security Architect
CYBER EXECS - London (Greater)
SOC Analyst, Aldershot, £47-56k + package
Infosec People - Hampshire, England, Aldershot
Senior Security Engineer
Loveworklife Recruitment - United Kingdom
Sign up to our newsletters
SC Magazine UK Articles
- Tesco Bank allegedly ignored warnings of hack from Visa
- Investigatory Powers and Digital Economy Bills could threaten economy
- Updated: A million German routers knocked offline by failed Mirai botnet attack
- Microsoft update left Azure Linux virtual machines open to hacking
- Gooligan ad fraud malware infects 1.3M Android users, installs over 2M unwanted apps
- SC Awards Europe 2016 winners announcements!
- ISIS radicalises 'lone wolves' through strong social media presence
- Updated: How will Brexit affect the cyber-security industry in UK and Europe?
- ICYMI: CEO Sacked; MS Zero-day; Passwords dropped; Ransomware wild, charging hack
- 9.2 million medical records for sale on darkweb
- ICYMI: Tesco warned; IP Bill threatens economy; German routers offline; Azure trojan; Gooligan fraud
- Data centres are on the move - where will they end up?
- 90% of ITDMs believe IAM is crucial to digital transformation success
- Research: Hacked companies could see customer exodus if breached
- Misconfigured drive exposes locations of explosives used by oil industry