iTnews

Review: Safe Access

By Peter Stephenson,CeRNS, on Jun 1, 2006 12:00AM
Review: Safe Access

This appliance comes loaded with features. Three default security policies monitor for up-to-date service packs, critical updates, anti-virus programs and updates, and the presence of worms, viruses or Trojans.

This appliance comes loaded with features. Three default security policies monitor for up-to-date service packs, critical updates, anti-virus programs and updates, and the presence of worms, viruses or Trojans.

The device scans by monitoring the network for new hosts or IP addresses and requires that each computer passes its tests before connecting it to the network. All activity is sent back to the organised web console and shown in a report explaining what tests the user passed or failed. The appliance will then try to bring the user up to policy or allow access to updates on the web.

The appliance is simple to setup and deploy rapidly on the network. The Safe Access platform is installed on its own server. The platform is built on Red Hat Linux and installs very quickly. Once setup is complete, configuration is done through the web interface. An intuitive and easy-to-understand configuration wizard assists in the final setup and configuration of policies.

Safe Access performed very well during our tests. We found that it even denied access to our clean test machine because the anti-virus software we installed on it required an update.

Neither of our machines were able to access network resources until the policy was met.

StillSecure Safe Access comes with a very large binder of printed documentation split up into different sections. The main sections are the quickstart guide and the user guide.

The quickstart guide is helpful in starting the appliance and getting the device up and running. The user’s guide helps with the configuration and explaining how to use the appliance’s web interface. The guide is certainly informative, but it can be difficult to navigate and find answers to questions during configuration.

Support for this appliance is offered to all licenced users by phone or email. Phone support is available during the week 8am-6pm US Mountain Time. Still Secure offers support packages for purchase with additional premium support services.

But while this appliance is very powerful, this comes at a heavy price. The Safe Access licence weighs in at around £21 per IP, which could become expensive for large enterprise networks – although volume discounts apply.

For: Very flexible with many policy options in all endpoint security categories.
Against: Very expensive with per IP licencing.
Verdict: Excellent, fully featured endpoint security solution.

Got a news tip for our journalists? Share it with us anonymously here.
Tags:
2006accessendpointsafesecurity

Partner Content

Alienated from your own data? You’re not alone
Promoted Content Alienated from your own data? You’re not alone
Tick off the ransomware bandits
Promoted Content Tick off the ransomware bandits
Security "mindset shift" needed to protect organisations
Promoted Content Security "mindset shift" needed to protect organisations
Top 5 Benefits of Managed IT Services
Promoted Content Top 5 Benefits of Managed IT Services

Sponsored Whitepapers

Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see
Beyond FTP: Securing and Managing File Transfers
Beyond FTP: Securing and Managing File Transfers
NextGen Security Operations: A Roadmap for the Future
NextGen Security Operations: A Roadmap for the Future
Video: Watch Juniper talk about its Aston Martin partnership
Video: Watch Juniper talk about its Aston Martin partnership
Don’t pay the ransom: A three-step guide to ransomware protection
Don’t pay the ransom: A three-step guide to ransomware protection

Events

  • iTnews Benchmark Awards 2022 - Finalist Showcase
  • 11th Annual Fraud Prevention Summit 2022
  • IoT Impact Conference
  • Cyber Security for Government Summit
By Peter Stephenson,CeRNS,
Jun 1 2006
12:00AM
0 Comments

Related Articles

  • Microsoft warns Azure customers of flaw that could have permitted hackers access to data
  • China spied on Russian defence research institutes
  • 'White hat' hackers no longer risk prosecution by the US
  • Careful you don't unwittingly hire North Korean IT freelancers
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Kmart Australia stands up consent-as-a-service platform

Kmart Australia stands up consent-as-a-service platform

NSW digital driver's licences 'easily forgeable'

NSW digital driver's licences 'easily forgeable'

Kmart Australia re-platforms ecommerce site to AWS

Kmart Australia re-platforms ecommerce site to AWS

Westpac promotes its head of technology to mortgage role

Westpac promotes its head of technology to mortgage role

Digital Nation

As NFTs gain traction, businesses start taking early bets
As NFTs gain traction, businesses start taking early bets
COVER STORY: From cost control to customer fanatics, AI is transforming the contact centre
COVER STORY: From cost control to customer fanatics, AI is transforming the contact centre
Case Study: PlayHQ leverages graph technologies for sports administration
Case Study: PlayHQ leverages graph technologies for sports administration
Metaverse hype will transition into new business models by mid decade: Gartner
Metaverse hype will transition into new business models by mid decade: Gartner
The other ‘CTO’: The emerging role of the chief transformation officer
The other ‘CTO’: The emerging role of the chief transformation officer
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.