HP Open View Select Access
February 16, 2005
- Ease of Use:
- Value for Money:
- Overall Rating:
Flexibility and scalability.
Not exactly plug-and-play.
A well-conceived enterprise-level managed solution.
HP OpenView Select Access 6.0 provides a sophisticated and scalable access management solution for online resources. It may be used for employees accessing intranet resources, for external users undertaking transactions with your organization via the internet, for partner organizations to share resources, or any mix of access.
Administration may be centralized or distributed via a delegated administration capability. Access rules follow a role-based approach according to user profiles.
Such information may already exist in LDAP directories, or be input via an administrator, or even by the user on a self-serve basis according to previously defined rules. External user data, and so profiles, may be subject to change and this can be readily detected.
Select Access 6.0 can also detect new resources on a given network and automatically add them to the Policy Matrix, a useful and intuitive visual matrix showing both users and resources.
Depending on your infrastructure, deployment may take a little planning and will typically involve various server components. Select Access itself makes heavy use of XML for queries responses and is potentially extendable via APIs, enabling custom plug-ins.
However, the features and tools provided as standard will probably satisfy most organizations. These include Setup and Policy Builder utilities for intuitive configuration and administration. Passwords are managed, including refresh rates and the sending of reminders, and users may update their own passwords. Single sign-on is supported for seamless domain navigation.
A wide range of operating systems and servers are supported, along with an impressive range of directories, making it likely that Select Access can be readily deployed within most organizations.
This is a serious product that, if correctly understood and configured, could bring many benefits to organizations for whom online access is key to their business.
SC Magazine Articles
- Yahoo breach; State-sponsored actors suspected, at least 500 million accounts affected
- Education sector bullied by ransomware and can barely defend itself, report
- Cisco warns of exploitation of new flaws linked to Shadow Brokers exploits
- DetoxCrypto ransomware imitates Malwarebytes software
- House Committee urges Obama not to pardon Snowden
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- Hard Rock Hotel & Casino Las Vegas hit with POS breach
- X-ray and MRI machines among devices used as springboards for data breach attacks
- Brexit shakeup: How will the U.K.'s exit from the EU affect the technology sector?
- Hacker purportedly selling over 650,000 stolen medical records on dark web marketplace
- OpenSSL patches 14 vulns, including high-severity flaw that can be exploited for DoS attacks
- IoT assault, connected devices increasingly used for DDoS attacks
- Cybercriminals already able to hack ATM biometric readers
- Cities planning transparency laws for police surveillance tech
- Malicious apps leveraging top UK brands has increased by 130%