The Instant Virtual Extranet (IVE) Access 3000 from Neoteris is a hardware/software hybrid SSL VPN appliance that offers users access to network resources securely. These resources also encompass web-enabled applications and email software (Lotus Notes and Microsoft Exchange), as well as Unix file shares.
In this Group Test we look at software solutions and hardware products which provide the means to access networks remotely, enabling security to be maintained when someone comes calling asking to be allowed in. Here we have a combination of an authentication software enabler and the means to access remotely using tokens and cards designed to ensure security levels are maintained.
The software, CRYPTOAdmin, is an authentication server and the backbone of the whole remote access solution. When combined with CRYPTOCard tokens and smartcards it provides a strong basis for remote access from anywhere in the world.
Last year we looked at the LapLink Gold solution, which has continued to improve over the years. This year is no exception. Now integrating three products into one to deliver LapLink Everywhere DELUXE, LapLink, Inc. is determined to improve remote access capabilities for the user without compromising on security.
With the first product in this suite you can access your PC from anywhere using a web browser to retrieve email, files or folders. LapLink Everywhere is a service that is provided for one year after purchase as a part of the LapLink Everywhere DELUXE suite.
Sometimes dialing into access data just isn't enough, and NetOp Remote Control allows remote access for the control of multiple PCs. This allows users to remotely initiate work from a distant location on their office workstation, enabling work to continue when they are unable to physically be at their desk. It can also provide useful and cost-efficient support from administration for problem solving, staff training and observation, or simply data use, all rolled into one.
NetOp Remote Control secures the communication while allowing authorized access. Controlling a keyboard and mouse, and viewing the screen of a remote computer is made easy with this solution, which makes an ideal tool for administration and management purposes wherever the skilled user is located. This means that a business can employ an expert at one location, but the enterprise can benefit from his or her expertise in branch offices no matter how diverse they may be geographically.
Not all remote access initiatives are used solely to provide employees with multi-location access. It may be necessary to provide a wider core of access rights that are in line with your business activities and, therefore, a more extensive resource may be required to fulfill all of your objectives.
This is where a solution such as Novell iChain comes into its own. This solution accomplishes more than simply allowing one level of access. It is capable of delivering a web-based authentication process that can be granular to your business needs, allowing customers and partners to access areas crucial for your commercial needs.
Similar to LapLink, pcAnywhere has long been a serious contender for employees and employers requiring remote access to data. It also provides a very easy to use software system, but without the cables for synchronization of PCs that LapLink provides. What you get is a CD that installs with ease and a quality user's guide. pcAnywhere also provides the administrator with a rebootless host to allow for installation without the usual reboot - great for servers that are critical to your business and require a problem to be assessed and resolved remotely.
We've looked at software solutions available for remote access, ideal for both corporate and employee use with many features, as well as being easy to install, configure and use. But what of the hardware alternatives to the problem? Do they also offer ease of use when accessing systems from geographically diverse sites?
Our next solution is a sleek and visually pleasing hardware alternative, which has been developed for the permanent off-site situation. This unit delivers a secure and robust communication between both sites without the remote user requiring new software or special training.
So far we have tested conventional remote access solutions, but the next product is designed for remote access with a difference. Take a situation where you have servers in many different geographical locations, but where employing IT specialists around the world is not economically viable.
American Megatrends, Inc. recognized this problem and introduced a hardware solution that enables the remote access required to repair and develop new installations and configurations from afar. The MegaRAC G2 provides a speedy connection, enabling one employee to oversee all your IT needs from just one location - in an instant.
Hardware located in the main office on your LAN can allow remote workers punctual and user-specific access to work areas that need to remain secure during any remote communication periods. The ability to use this type of access improves productivity and ensures that employees are able to work remotely without compromising your network security.
It is not always a software solution that saves the day when you want to work remotely. From a small branch office or home office a VPN tunnel may fit the bill and SonicWALL has several hardware solutions that may provide the security that you are in need of. We took a look at the SonicWALL TELE3 SP as an alternative solution for secure remote access communications.
From a user perspective it is easy enough to install, and anyone who has purchased a PC and set it up at home for themselves will be able to get to grips with this small but secure solution. The TELE3 SP takes up very little room and is ideal for those using an always-on broadband connection. Alternatively, it comes with a fail-over modem connection, which can be set as default for non-broadband users.
One potential security loophole that is frequently overlooked is access to removable media. Many access control products will bar your way into the file server, log your attempts to look at the payroll database, and prevent you from using certain applications, but this is all at the system level.
If you think Unix houses have been ignored in this test, Symark's PowerBroker is just for you. Supporting multiple flavors of Linux and Unix - including IBM S390 Linux - PowerBroker ensures Unix administrative privileges can be safely managed and delegated.
Access control comes in many flavors, depending on what you want or don't want users to have access to. Now it's the turn of other documents to get some added protection with Adhaero's business document security solution. This protection extends beyond the network, and documents under its aegis can only be read by authorized eyes. It allows Word, Excel, PowerPoint and Outlook objects to be encrypted, and then assigns digital rights that dictate what can be done to them.
We are back in the world of passwords for Computer Associates' offering. Part of the eTrust suite of products, eTrust AccessControl is another policy-based application, fully integrated with the other eTrust products, as well as with CA's UniCenter network management software. It is designed to operate in Windows, Unix and Linux, and interoperates with (surprising, but not unwelcome), mainframe environments.
Novell is no stranger to access management; such functionality was built into its NetWare operating system from day one, and is an integral part of its Directory Services offering. So, it comes as no surprise to see a standalone Novell product in this Group Test.
One potential security loophole that is frequently overlooked is access to removable media. Many access control products will bar your way into the file server, log your attempts to look at the payroll database, and prevent you from using certain applications, but this is all at the system level.
If you think Unix houses have been ignored in this test, Symark's PowerBroker is just for you. Supporting multiple flavors of Linux and Unix - including IBM S390 Linux - PowerBroker ensures Unix administrative privileges can be safely managed and delegated.