HP Open View Select Access
February 16, 2005
- Ease of Use:
- Value for Money:
- Overall Rating:
Flexibility and scalability.
Not exactly plug-and-play.
A well-conceived enterprise-level managed solution.
HP OpenView Select Access 6.0 provides a sophisticated and scalable access management solution for online resources. It may be used for employees accessing intranet resources, for external users undertaking transactions with your organization via the internet, for partner organizations to share resources, or any mix of access.
Administration may be centralized or distributed via a delegated administration capability. Access rules follow a role-based approach according to user profiles.
Such information may already exist in LDAP directories, or be input via an administrator, or even by the user on a self-serve basis according to previously defined rules. External user data, and so profiles, may be subject to change and this can be readily detected.
Select Access 6.0 can also detect new resources on a given network and automatically add them to the Policy Matrix, a useful and intuitive visual matrix showing both users and resources.
Depending on your infrastructure, deployment may take a little planning and will typically involve various server components. Select Access itself makes heavy use of XML for queries responses and is potentially extendable via APIs, enabling custom plug-ins.
However, the features and tools provided as standard will probably satisfy most organizations. These include Setup and Policy Builder utilities for intuitive configuration and administration. Passwords are managed, including refresh rates and the sending of reminders, and users may update their own passwords. Single sign-on is supported for seamless domain navigation.
A wide range of operating systems and servers are supported, along with an impressive range of directories, making it likely that Select Access can be readily deployed within most organizations.
This is a serious product that, if correctly understood and configured, could bring many benefits to organizations for whom online access is key to their business.
Sign up to our newsletters
SC Magazine Articles
- Microsoft report explores dangers of running expired security software
- Survey: real-time SIEM solutions help orgs detect attacks within minutes
- Vulnerabilities identified in three Advantech products
- Android malware 'NotCompatible' evolves, spawns resilient botnet
- State Department hack may be tied to White House network breach
- Operators disable firewall features to increase network performance, survey finds
- Waste no time patching Windows Schannel, OLE bugs, experts warn
- Study: 68 percent of healthcare breaches caused by loss or theft of devices, files
- Spin.com redirects to Rig Exploit Kit, infects users with malware, Symantec observes
- Upping the ante: PCI Security Standard
- Study: Third of employees use company devices for social media and online shopping
- 'DoubleDirect' MitM attack affects iOS, Android and OS X users
- Swedish appeals court nixes Assange's plea
- Critical XSS vulnerability addressed in WordPress
- The Internet of Things (IoT) will fail if security has no context