iTnews
  • Home
  • Features
  • Technology
  • Security

Review: ProtectID

By Peter Stephenson,CeRNS, on Jan 18, 2008 4:01PM
Review: ProtectID

StrikeForce’s ProtectID provides an open-architecture platform for strong user authentication. The product allows multiple authentication methods such as biometrics and mobile-phone authentication for remote users to be mixed and matched for customers needing multi-layered security access. No middleware is needed, thanks to its ability to link directly to a domain controller.

StrikeForce’s ProtectID provides an open-architecture platform for strong user authentication. The product allows multiple authentication methods such as biometrics and mobile-phone authentication for remote users to be mixed and matched for customers needing multi-layered security access. No middleware is needed, thanks to its ability to link directly to a domain controller.

ProtectID uses a distributed architecture with a central controller and remote agents. The latter communicate with the controller via an encrypted protocol. The solution makes securing a new system simple, you just have to install a new agent on the server. It uses a central identity agent consisting of a desktop interface that supports password or biometric authentication by a ProtectID secure channel. Other features include secure website logon, VPN access and terminal authentication.

We had no problems deploying StrikeForce’s offering. Administration is via the ProtectID manager web GUI, which makes constructing user accounts and privileges simple. ProtectID creates its own website in IIS and has out-of-band authentication to web applications via mobile phone for heightened security.

This product worked flawlessly under test and was flexible during the deployment phase. It quickly integrated into the Active Directory structure and uses SQL or MSDE as its operational data store. The ProtectID server can be configured to synchronise with the domain controller every 60 minutes or can be adjusted manually on demand.

StrikeForce’s documentation is good and simple to follow. The manuals are easy to navigate, with a hyperlinked table of contents for quick information retrieval.

Support offerings are available for normal business and extended hours as well as around the clock. However, there are no self-support features on the website. We feel that a knowledge base and technical FAQ would be helpful for users.

The product has a base price of £12.20 per user, which is a one-time fee. This is at the low end of the pricing spectrum.

For: StrikeForce's offering does not require costly middleware due to direct integration with the domain controller
Against: There is no technical support offered via the website
Verdict: A solid product with less than stellar support options

Got a news tip for our journalists? Share it with us anonymously here.
Tags:
protectidsecurity

Partner Content

The Great Resignation has intensified insider security threats
Promoted Content The Great Resignation has intensified insider security threats
"We're seeing some good policy put in place, but that's the exception"
Partner Content "We're seeing some good policy put in place, but that's the exception"
How to turn digital complexity into competitive advantage
Promoted Content How to turn digital complexity into competitive advantage
Avoiding CAPEX by making on-premise IT more cloud-like
Promoted Content Avoiding CAPEX by making on-premise IT more cloud-like

Sponsored Whitepapers

Extracting the value of data using Unified Observability
Extracting the value of data using Unified Observability
Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see
Beyond FTP: Securing and Managing File Transfers
Beyond FTP: Securing and Managing File Transfers
NextGen Security Operations: A Roadmap for the Future
NextGen Security Operations: A Roadmap for the Future
Video: Watch Juniper talk about its Aston Martin partnership
Video: Watch Juniper talk about its Aston Martin partnership

Events

  • CRN Channel Meets: CyberSecurity Live Event
  • IoT Insights: Secure By Design for manufacturing
  • Cyber Security for Government Summit
By Peter Stephenson,CeRNS,
Jan 18 2008
4:01PM
0 Comments

Related Articles

  • Qld gov proposes mandatory data breach reporting for agencies
  • Critical Splunk bug propagates code execution
  • Researchers hacked Oracle servers to demo serious vulnerability
  • Don't remove PowerShell: US, UK and NZ security agencies
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Qantas calls time on IBM, Fujitsu in tech modernisation

Qantas calls time on IBM, Fujitsu in tech modernisation

Service NSW hits digital services goal two years early

Service NSW hits digital services goal two years early

SA Police ignores Adelaide council plea for facial recognition ban on CCTV

SA Police ignores Adelaide council plea for facial recognition ban on CCTV

NBN Co says TPG tie-up could help Telstra sidestep spectrum limits

NBN Co says TPG tie-up could help Telstra sidestep spectrum limits

Digital Nation

The security threat of quantum computing
The security threat of quantum computing
Crypto experts optimistic about future of Bitcoin: Block
Crypto experts optimistic about future of Bitcoin: Block
IBM global chief data officer on the rise of the number crunchers
IBM global chief data officer on the rise of the number crunchers
Integrity, ethics and board decisions in the digital age
Integrity, ethics and board decisions in the digital age
COVER STORY: Operationalising net zero through the power of IoT
COVER STORY: Operationalising net zero through the power of IoT
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.