Norman delivered quick and efficient performance, with acceptable, but unexceptional, reporting. Installation required Norman Virus Control to be installed first, for the AV engine. No reboot was required and, if anything, a surprising lack of feedback resulted - the software just quietly went to work with the default server configuration.
Sometimes dialing into access data just isn't enough, and NetOp Remote Control allows remote access for the control of multiple PCs. This allows users to remotely initiate work from a distant location on their office workstation, enabling work to continue when they are unable to physically be at their desk. It can also provide useful and cost-efficient support from administration for problem solving, staff training and observation, or simply data use, all rolled into one.
NetOp Remote Control secures the communication while allowing authorized access. Controlling a keyboard and mouse, and viewing the screen of a remote computer is made easy with this solution, which makes an ideal tool for administration and management purposes wherever the skilled user is located. This means that a business can employ an expert at one location, but the enterprise can benefit from his or her expertise in branch offices no matter how diverse they may be geographically.
One potential security loophole that is frequently overlooked is access to removable media. Many access control products will bar your way into the file server, log your attempts to look at the payroll database, and prevent you from using certain applications, but this is all at the system level.
If you think Unix houses have been ignored in this test, Symark's PowerBroker is just for you. Supporting multiple flavors of Linux and Unix - including IBM S390 Linux - PowerBroker ensures Unix administrative privileges can be safely managed and delegated.
Access control comes in many flavors, depending on what you want or don't want users to have access to. Now it's the turn of other documents to get some added protection with Adhaero's business document security solution. This protection extends beyond the network, and documents under its aegis can only be read by authorized eyes. It allows Word, Excel, PowerPoint and Outlook objects to be encrypted, and then assigns digital rights that dictate what can be done to them.
We are back in the world of passwords for Computer Associates' offering. Part of the eTrust suite of products, eTrust AccessControl is another policy-based application, fully integrated with the other eTrust products, as well as with CA's UniCenter network management software. It is designed to operate in Windows, Unix and Linux, and interoperates with (surprising, but not unwelcome), mainframe environments.
Novell is no stranger to access management; such functionality was built into its NetWare operating system from day one, and is an integral part of its Directory Services offering. So, it comes as no surprise to see a standalone Novell product in this Group Test.
One potential security loophole that is frequently overlooked is access to removable media. Many access control products will bar your way into the file server, log your attempts to look at the payroll database, and prevent you from using certain applications, but this is all at the system level.
If you think Unix houses have been ignored in this test, Symark's PowerBroker is just for you. Supporting multiple flavors of Linux and Unix - including IBM S390 Linux - PowerBroker ensures Unix administrative privileges can be safely managed and delegated.