Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Latest News
    • Networking

    StillSecure Provides All-in-One NAC Protection

    Written by

    Cameron Sturdevant
    Published March 5, 2007
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      StillSecures Safe Access 5.0 is a complete, flexible network access control solution that has the potential to accommodate tomorrows technology advances.

      Safe Access 5.0, which started shipping in October 2006, is competitively priced at $20 per IP address for a 2,500-user deployment. Safe Access can run on commodity servers, and, in its simplest in-line protection mode, it requires no changes to network switching or routing configurations.

      While these factors combine to keep the initial deployment costs low, Safe Access does provide the full range of NAC features that are needed to go from an initial installation to an advanced 802.1x authentication environment with clusters of StillSecure Enforcement Servers.

      As with most of the maturing products in the NAC category, Safe Access 5.0 supports a wide range of Microsoft Windows versions, from Windows 98 to Windows Server 2003. Company officials indicated that support for other operating systems, including Linux and Apples Mac OS X, are planned for a future release of the product.

      While Safe Access 5.0 can support 802.1x and DHCP (Dynamic Host Configuration Protocol) enforcement, we started our pilot review as we think most organizations will: by installing a single, in-line server installation.

      Weve taken to heart the advice given repeatedly at the recent RSA Conference: Dont boil the ocean as the first step of a NAC implementation. While its a good idea to begin with a limited deployment and to keep it simple, the end goal should be to implement a system that can provide robust posture checking along with smooth user remediation.

      We spent most of our evaluation time setting up conditions that would require endpoints to be quarantined. For our in-line installation, we used the straightforward Web-based administrator interface to specify an IP address list of servers that provided access to remediation services.

      In our case, this was an update to the latest anti-virus update of Symantecs Norton Internet Security 2007. Safe Access 5.0 comes with several Symantec services already configured.

      The product itself is quite safe to use in departments with large numbers of network administrators. We were able to easily configure a variety of administrative user roles: from those restricted to view-only for the enforcement cluster for which they were responsible to a system administrator role that had all permissions available.

      It is important to look for limited administrative privileges in NAC products to ensure that admins themselves are prevented from creating security gaps.

      Access policies determine the requirements that must be met by an endpoint to get a clean bill of health and access to the network. In our most stringent tests, we were able to successfully flunk endpoints that missed only one among several tests. We successfully checked for installed services packs and hotfixes; the presence of approved software; and the absence of worms, viruses, Trojans and unauthorized peer-to-peer software.

      StillSecure provides tests, updated automatically every hour, to enforce access policies. We were able to override the hourly cycle and manually check for tests, although we found the hour window sufficient for keeping current.

      /zimages/6/28571.gifNAC leaders admit the technology has a long way to go. Click here to read more.

      We were especially impressed with the testing and remediation process provided by Safe Access 5.0. When our remote access clients connected via our VPN, they were first subjected to a scanning process that we configured with the help of StillSecure field support.

      IT managers should be aware that Safe Access 5.0, like several other NAC products, sometimes requires that Microsofts Internet Explorer browser settings—and similar settings in other browsers—be set to some setting other than “high” security for scanning to work correctly.

      Because this requirement is in place only for agentless scanning and for first-time agent installation, we think the risks are worth the payoff.

      That said, its hard to see how effective NAC can be without agent software. We suggest that IT managers factor the cost of agent installation and maintenance into any proposed NAC implementation, no matter how rosily the salesperson speaks about agentless machine scanning.

      Administrators should note that some older devices are unlikely to be able to use the 802.1x supplicant that is emerging as a requirement for the most secure internal networks. Handling such devices should therefore be considered part of any NAC pilot.

      In our tests of Safe Access 5.0, we were able to use static IP addresses combined with MAC addresses to allow unscannable machines onto the network. This is a technique similar to that used by Cisco Systems Network Admission Control product. Its an effective workaround, especially since Safe Access, like other NAC products, has the power to deny network access.

      Technical Director Cameron Sturdevant can be reached at cameron_sturdevant@ziffdavis.com.

      /zimages/6/28571.gifCheck out eWEEK.coms for the latest news, views and analysis on servers, switches and networking protocols for the enterprise and small businesses.

      Cameron Sturdevant
      Cameron Sturdevant
      Cameron Sturdevant is the executive editor of Enterprise Networking Planet. Prior to ENP, Cameron was technical analyst at PCWeek Labs, starting in 1997. Cameron finished up as the eWEEK Labs Technical Director in 2012. Before his extensive labs tenure Cameron paid his IT dues working in technical support and sales engineering at a software publishing firm . Cameron also spent two years with a database development firm, integrating applications with mainframe legacy programs. Cameron's areas of expertise include virtual and physical IT infrastructure, cloud computing, enterprise networking and mobility. In addition to reviews, Cameron has covered monolithic enterprise management systems throughout their lifecycles, providing the eWEEK reader with all-important history and context. Cameron takes special care in cultivating his IT manager contacts, to ensure that his analysis is grounded in real-world concern. Follow Cameron on Twitter at csturdevant, or reach him by email at cameron.sturdevant@quinstreet.com.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×