Deepnet Security Limited Unified Authentication Platform v3.11
Strengths: Flexible with many user token options; users can possess multiple tokens and choose authentication component at logon.
Weaknesses: Lacks reporting; has auditing, but it has to be exported for history and reports.
Verdict: Easy to use; management interface easy to navigate; good value for the money.
SummaryDeepnet Security Limited's Unified Authentication Platform v3.11 is a single integrated security platform for provisioning, managing and verifying all types of user and host authentication methods. The software had several operating system dependencies and required us to load several modules before we could begin configuring and managing users.
Once loaded, this strong authentication solution is very easy to use for both the client side and administrative user. The server software supports both MS Windows Server and Linux operating systems.
Once loaded, the web-based administration interface was launched to configure our users and provision our tokens. We were very impressed with the ease of navigation within the management interface. As we moved down the left-hand navigation element, our configuration options appeared in the center pane, always keeping us just a few mouse clicks away from what we wanted next. This made it easy to jump between configuring users, provisioning authentication options and looking at audit logs for troubleshooting.
The tool has LDAP and AD integration, simplifying user provisioning and management.
Basic support is only eight hours a day/five days a week and includes email for the first month, a little light for an enterprise style deployment. Upgraded support is not available and the website lacks support items, like a knowledge base and FAQ section.
This was a good solution and proved easy to use. Even though it required the same amount of work to configure and manage users as the other solutions, the management interface seemed to go faster and was less confusing. Auditing was available and helpful during initial installations and provisioning of users. For historical auditing on events, however, you would have to export your logs to a CSV file and use a third-party reporting facility.