Strengths: Very good, fast, powerful endpoint security compliance tool that does what it does very well.
Weaknesses: Limited functionality.
Verdict: As corporate governance legislation gets ever tighter, this device will help companies cope.
Netclarity’s distinctive green 1U rack mount Auditor Enterprise device is described as a CVE (Common Vulnerabilities and Exposures)-compliant network security system. It offers vulnerability assessment functions to help firms comply with corporate governance legislation by conducting an audit against pre-defined CVE vulnerabilities. This helps endpoint security by quarantining infected systems until they are remediated.
It also integrates with a range of firewalls and switches from third parties like Juniper, Cyberguard, Secure Computing and Cisco.
A clearly laid-out, single sheet setup guide helped us get the device up and running with very little fuss.
The Linux-based unit performed a self check as it loaded its Audior Network Configuration v4 application, but strangely kept failing to recognize our network’s DHCP server. To get around this, we configured a static address directly.
When we fired up the web-based management interface over http, we were prompted to enter the user name and the supplied, very strong, complex password. This fired up the system setup GUI, which was clearly laid out and easy to navigate.
We were then presented with a screen listing the regulations and security programs the device supports, along with major charge and credit card security programs.
We were then moved onto the asset discovery phase, where Auditor Enterprise managed to find all of the devices hosted on our test network. But it was vague when it came to reporting one of our clients as running either Windows ME, 2000 Pro, Advanced Server or XP. It also scanned itself and reported its OS and mac address as hidden to improve security.
We used the one-click audit wizard to audit one of the test clients on our networks. Its scanning through the subnet was impressively fast – as was its scanning of a client. The device completed both these tasks in just a matter of a few seconds.
The system returns impressively detailed PDFs analyzing the vulnerabilities on each client machine scanned.