October 06, 2004
$6,400 (25 nodes)
- Ease of Use:
- Value for Money:
- Overall Rating:
Its ability to combine KVM with VPN facilities is an unusual and useful feature.
The lack of specific Windows authentication support may deter Windows users.
The system is of particular interest to sites that need both remote management and VPN facilities.
This device is unusual in that it offers not only SSL VPN facilities, but can support remote keyboard/video/ mouse (KVM) access to servers, combining two major sets of remote functions in one connection. This has several advantages, since it reduces the number of possible entry points to a secure system. In turn, this can reduce the number of firewall rules needed, which often improves firewall performance. Network administration and technical support can also be simplified with fewer resources needed for control and auditing.
Installing the 1U height device is straightforward. The initial configuration is carried out using the four buttons located on the faceplate to set the initial IP address and net mask before rebooting the system. All other operations can then be performed using a web browser. System configuration and administration tasks are assigned to separate user accounts to give extra security and prevent inadvertent configuration changes.
User authentication can be based on either Radius or local database data, but there is no provision for other methods.
Access to services is controlled by making associations between devices, services and users, giving each user bespoke access to resources from a single log-in screen. Because the system deals with devices as well as services, it can also be set up to provide remote access facilities for technical staff, so they can manage individual hosts and KVM devices without the need for special software or hardware.
The system provides detailed logging and reporting facilities, with options to generate email alerts for situations such as forced account deactivation or specific user sign-on. Log files can be archived and exported for storage and analysis elsewhere as required.
Users gain access to the system using a Java-enabled web browser over an SSL connection to the device. All the user's allocated resources are displayed in a system-generated web page, and all communication between the user and the selected resource is carried out through the secure link.
SC Webcasts UK
Information Security Manager
Infosec People - Hammersmith, West London
Junior Penetration Tester, Hertfordshire, to £35k + benefits
Infosec People - England, Hertfordshire
Cyber Security Architect
CYBER EXECS - London (Greater)
SOC Analyst, Aldershot, £47-56k + package
Infosec People - Hampshire, England, Aldershot
Senior Security Engineer
Loveworklife Recruitment - United Kingdom
Sign up to our newsletters
SC Magazine UK Articles
- Tesco Bank allegedly ignored warnings of hack from Visa
- Investigatory Powers and Digital Economy Bills could threaten economy
- Updated: A million German routers knocked offline by failed Mirai botnet attack
- Gooligan ad fraud malware infects 1.3M Android users, installs over 2M unwanted apps
- Microsoft update left Azure Linux virtual machines open to hacking
- SC Awards Europe 2016 winners announcements!
- ISIS radicalises 'lone wolves' through strong social media presence
- Updated: How will Brexit affect the cyber-security industry in UK and Europe?
- ICYMI: CEO Sacked; MS Zero-day; Passwords dropped; Ransomware wild, charging hack
- 9.2 million medical records for sale on darkweb
- ICYMI: Tesco warned; IP Bill threatens economy; German routers offline; Azure trojan; Gooligan fraud
- Data centres are on the move - where will they end up?
- 90% of ITDMs believe IAM is crucial to digital transformation success
- Research: Hacked companies could see customer exodus if breached
- Misconfigured drive exposes locations of explosives used by oil industry