Review: Secure Access Manager

By

This product provides users with SSO and administrators with a centralized way of managing the applications and resources that a user can access. It uses a centralized Policy Server and security plug-ins on user workstations and it authenticates users at first login with a choice, or combination, of password, Radius, token, certificate, smartcard or biometric authentication methods.

This product provides users with SSO and administrators with a centralized way of managing the applications and resources that a user can access. It uses a centralized Policy Server and security plug-ins on user workstations and it authenticates users at first login with a choice, or combination, of password, Radius, token, certificate, smartcard or biometric authentication methods.

Review: Secure Access Manager

After login, the Windows or Citrix user's desktop is modified to suit the user's security profile and displays only the application icons the user can access. Local security is offered, including an inactivity time-out and smartcard withdrawal control.

Administrators can manage access rights in synchronization with multiple LDAP directories and existing identity-management solutions.

User rights and profiles can be managed centrally by administrators or directly by users from their desktop or web browsers in 'self administration' mode. There is full support for hierarchical delegated administration in which managers see only their assigned capabilities.

Secure Access Manager requires no modification of target systems and applications. SSO is effected from the user's desktop and target systems do not need to be aware of how it is achieved. No scripting or development is required, because the intuitive, drag-and-drop graphical interface makes it easy to define the applications that must be handled by SSO. Deployment to desktops is automated by integrated distribution software.

The audit and reporting functions provide a wide range of reports in which relevant information is presented selectively. Alarms can be set to alert administrators to any problems, risks and vulnerabilities.

The Policy Server runs on Windows 2000, AIX, and Solaris. SSO clients are available for Windows 98/XP/NT/2000/2003 workstations and servers, Windows Terminal Server, Linux, AIX, Solaris, Citrix MetaFrame and NFuse.

For:

Requires no modification of target systems and applications.


Against:

Customized desktop and local workstation security is available only in Windows environments.


Verdict:

Provides easy-to-implement and comprehensive SSO without requiring any special skills to deploy.

Got a news tip for our journalists? Share it with us anonymously here.
Tags:

Most Read Articles

India's alarm over Chinese spying rocks CCTV makers

India's alarm over Chinese spying rocks CCTV makers

Hackers abuse modified Salesforce app to steal data, extort companies

Hackers abuse modified Salesforce app to steal data, extort companies

Victoria's Secret pulls down website amid security incident

Victoria's Secret pulls down website amid security incident

Cyber companies hope to untangle weird hacker codenames

Cyber companies hope to untangle weird hacker codenames

Log In

  |  Forgot your password?