Novell, Oblix Boost Access Control - Page 2

Download the authoritative guide: How to Develop an IT Security Strategy

.0">

iChain 2.0

USABILITY

A

CAPABILITY

B

PERFORMANCE

B

INTEROPERABILITY

C

MANAGEABILITY

B

Novells iChain update features a well-implemented proxy approach that makes it a good choice for businesses in need of a capable access control system that can be quickly implemented and easily managed.

SHORT-TERM BUSINESS IMPACT // Using iChain, a company can quickly implement access control for an entire Web site without having to deal with Web server-based agents and detailed rules.

LONG-TERM BUSINESS IMPACT // Although iChains approach is attractive for quickly building access control, businesses moving into Web services and other Web application areas might need more developer-oriented access control down the road.

PROS: Proxy-based approach makes it easy to limit access to entire Web sites; good single-sign-on features.

CONS: Doesnt do granular application-level access control; must use Novell eDirectory as directory.

Novell Inc., Provo, Utah; (888) 321-4272; www.novell.com