Name: StormShield v5.1
- Very strong endpoint solution to protect the enterprise or corporate assets.
- Not a lot of protection on the portable device.
- If you want to control access from personal portable devices to your PCs, this is a great solution.
SC Labs Reviews
Reviews from our expert team
StormShield Device Control System v5.1 is part of the StormShield integrated offering. StormShield is a distributed protection system that covers all of the workstations belonging to an organization. Its architecture is based on a multi-tier model and on deployment techniques that allow it to be quickly integrated into the organization’s network. The architecture includes the StormShield Server, database, StormShield Management Console and client agents.
The server installation went well. The product required a database backend, but it did ship with an integrated Microsoft SQL Server Desktop Engine (MSDE) that we used as part of our test load. There are capabilities to deploy slave servers with a shared SQL backend that would complicate the deployment some.
The product is a full-featured endpoint security solution. For this review, we focused solely on its ability to deliver protection based on our criteria for portable devices. This protection was delivered through the product’s device control feature. StormShield policies are centrally managed by the SkyRecon console, where risk-based policies can be defined to control how, where and by whom any input/output (I/O) device can be used.
We were then ready to manage our portable device. Portable devices are managed through port connections on the remote workstation/PC. The portable device would also need to be synchronized using ActiveSync. We could then manage the portable device as any other USB-connected storage device.
Standard support is included for 18 percent of the license fee. Additional support options are available. Documentation was complete and very detailed.
This is a great solution for an organization that wants to cover all aspects of endpoint security. As a standalone portable device security solution, it was very complex for little additional security on the device itself. However, as a corporate endpoint protection solution to guard against these devices attaching in an unauthorized fashion to corporate assets, it’s a great solution. You have to decide what is important to you.