Either as a closed environment or as a service, Endeavors Technology’s Magi Enterprise is a peer-to-peer security solution ideal for end users who have little or no experience with installing security solutions, but who are charged with telecommuting on a regular basis. From the administrator’s viewpoint, removing any end-user problems can make the whole job of securing the data flow far easier.
Access control comes in many flavors, depending on what you want or don’t want users to have access to. Now it’s the turn of other documents to get some added protection with Adhaero’s business document security solution. This protection extends beyond the network, and documents under its aegis can only be read by authorized eyes. It allows Word, Excel, PowerPoint and Outlook objects to be encrypted, and then assigns digital rights that dictate what can be done to them.
We are back in the world of passwords for Computer Associates’ offering. Part of the eTrust suite of products, eTrust AccessControl is another policy-based application, fully integrated with the other eTrust products, as well as with CA’s UniCenter network management software. It is designed to operate in Windows, Unix and Linux, and interoperates with (surprising, but not unwelcome), mainframe environments.
Novell is no stranger to access management; such functionality was built into its NetWare operating system from day one, and is an integral part of its Directory Services offering. So, it comes as no surprise to see a standalone Novell product in this Group Test.
One potential security loophole that is frequently overlooked is access to removable media. Many access control products will bar your way into the file server, log your attempts to look at the payroll database, and prevent you from using certain applications, but this is all at the system level.
If you think Unix houses have been ignored in this test, Symark’s PowerBroker is just for you. Supporting multiple flavors of Linux and Unix — including IBM S390 Linux — PowerBroker ensures Unix administrative privileges can be safely managed and delegated.