iTnews
  • Home
  • Features
  • Technology
  • Security

Review: Imprivata OneSign v3.6

By Peter Stephenson,CeRNS, on Jan 22, 2008 12:00AM
Review: Imprivata OneSign v3.6

Convergence is the best word to sum up this appliance-based offering. Imprivata OneSign brings together three pieces of identity management. The first is authentication management, which replaces Windows-based authentication with stronger methods that can be managed in one place.

Next is single sign-on, which is implemented for all legacy, client/server, Windows, Java and web applications in an easy and efficient manner. The final piece is physical/logical, an interesting feature that can integrate network and building access systems to provide a single consolidated user identity based on specific policies.

We found this product fairly simple to deploy and manage. The appliances are shipped as a redundant pair and, once the machines were booted, we were able to configure both the primary and secondary box through an easy-to-follow, web-based wizard. Once the initial setup is complete, things start to get a bit more complicated. The web GUI, while quite intuitive to navigate, leaves something to be desired when it comes to actually doing something with it. It took us some time to get used to the way the initial policy and assign applications are set up. However, this did get a bit simpler with use.

The Imprivata OneSign platform is designed to work with existing user provisioning systems, so it does not do provisioning itself. It does, however, add some great functionality to the identity management infrastructure. This is also designed to integrate into a user directory store such as Active Directory and pull user information.

Documentation is on the heavy side. The pack includes getting-started guides, user guides, appliance guides and administration guides in paper and PDF form. All were well organised and quite helpful.

Support is offered in two flavours, basic and premium. Both include varying degrees of phone, email, and web technical support as well as access to the online customer centre with its downloads and knowledge base.

We find this product average value for money. Starting at £35 per user for the whole suite, it can become a pricey investment, especially since it has to rely on other systems for provisioning. If identity management as a whole is what you are after, this could leave some functionality gaps.

For: Easy-to-deploy redundant pair for user and authentication management
Against: Pricey considering it does not do provisioning
Verdict: A solid product that, combined with a provisioning system, creates a good ID management infrastructure

Got a news tip for our journalists? Share it with us anonymously here.
Tags:
identitymanagementsecurity

Partner Content

Why Genworth Australia embraced low-code software development
Promoted Content Why Genworth Australia embraced low-code software development
The Great Resignation has intensified insider security threats
Promoted Content The Great Resignation has intensified insider security threats
Accenture and Google Cloud team up to create a loveable, Australian-first, renewable energy product
Promoted Content Accenture and Google Cloud team up to create a loveable, Australian-first, renewable energy product
Security: Understanding the fundamentals of governance, risk & compliance
Promoted Content Security: Understanding the fundamentals of governance, risk & compliance

Sponsored Whitepapers

Extracting the value of data using Unified Observability
Extracting the value of data using Unified Observability
Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see
Beyond FTP: Securing and Managing File Transfers
Beyond FTP: Securing and Managing File Transfers
NextGen Security Operations: A Roadmap for the Future
NextGen Security Operations: A Roadmap for the Future
Video: Watch Juniper talk about its Aston Martin partnership
Video: Watch Juniper talk about its Aston Martin partnership

Events

  • CRN Channel Meets: CyberSecurity Live Event
  • IoT Insights: Secure By Design for manufacturing
  • Cyber Security for Government Summit
By Peter Stephenson,CeRNS,
Jan 22 2008
12:00AM
0 Comments

Related Articles

  • India withdraws warning on national biometric ID after online panic
  • Australia's ID systems 'deficient', unfit for online: review
  • Officeworks stands up its own enterprise identity platform
  • Ukraine has started using Clearview AI's facial recognition during war
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Qantas calls time on IBM, Fujitsu in tech modernisation

Qantas calls time on IBM, Fujitsu in tech modernisation

Service NSW hits digital services goal two years early

Service NSW hits digital services goal two years early

SA Police ignores Adelaide council plea for facial recognition ban on CCTV

SA Police ignores Adelaide council plea for facial recognition ban on CCTV

NBN Co says TPG tie-up could help Telstra sidestep spectrum limits

NBN Co says TPG tie-up could help Telstra sidestep spectrum limits

Digital Nation

The security threat of quantum computing
The security threat of quantum computing
Integrity, ethics and board decisions in the digital age
Integrity, ethics and board decisions in the digital age
COVER STORY: Operationalising net zero through the power of IoT
COVER STORY: Operationalising net zero through the power of IoT
Crypto experts optimistic about future of Bitcoin: Block
Crypto experts optimistic about future of Bitcoin: Block
IBM global chief data officer on the rise of the number crunchers
IBM global chief data officer on the rise of the number crunchers
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.