Access "Hot Pick: Elemental's Elemental Compliance System 1.1"
This article is part of the August 2005 issue of Betting the house on network anomaly detection systems
Elemental's Elemental Compliance System 1.1 Elemental Price: Starts at about $100,000 for server and 500 agents @exb Elemental's Elemental Compliance System 1.1 @exe Compliance is all the buzz, but the real challenge is leveraging tools that give organizations a firm grip on their enterprise security posture and do more than simply earn an auditor's signature. Elemental's Elemental Compliance System (ECS) unites enterprise-wide host configuration, policy management and network access control into one easy-to-use package. ECS employs agent technology to monitor hosts and align them with policy, polling the server for current policies, assessing host status and reporting back to the server for correlation. If a host or group is out of compliance, network access may be restricted or stopped. Hosts that don't have an agent can be given restricted network access. The server supports 4,000 managed clients, and multiple ECS servers can share a common master database. Policies can be created from a wide range of rules, including usage of most common antivirus ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
A Safe Bet?
Network anomaly detection is the newest player at the security table.
-
Boot Camp
Whip your users into shape with security awareness training.
-
Paper or PKI?
SAFE is a biopharmaceutical industry initiative to standardize credentials for drug discovery. It could save the industry billions.
-
Switching Lanes
Learn how to leverage the VLAN as a security tool.
-
Recent Releases: Security product briefs, August 2005
Learn about the security products released in August 2005.
-
Password Security
Symark Software's PowerKeeper 1.4
-
A Safe Bet?
-
-
Proving Grounds
Test labs are the ideal place to check theory against reality.
-
Hot Pick: Elemental's Elemental Compliance System 1.1
Elemental's Elemental Compliance System 1.1
-
Identity Management: Trustgenix's IdentityBridge Standard Edition
Trustgenix's IdentityBridge Standard Edition
-
Wireless security review: Juniper Networks' Netscreen-5GT Wireless
Juniper Networks' Netscreen-5GT Wireless
-
Hacking Exposed: Network Security Secrets & Solutions
Read a review of the security book Hacking Exposed: Network Security Secrets & Solutions (Fifth Edition).
-
Proving Grounds
-
Columns
-
Ping: Chrisan Herrod
Chrisan Herrod
-
Perspectives: Which security certification best meets your needs?
The pressure is on to earn security certifications to prove your worth.
-
Publisher's Note: Compliance 2.0
Learn about Compliance 2.0, which involves continuous process improvement.
-
On The Radar: NIST resources
Help from the Government
-
Ping: Chrisan Herrod
More Premium Content Accessible For Free
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Emerging threat detection techniques and products
E-Handbook
Advanced persistent threat (APT) has been a used and abused term in the security industry, but security experts say targeted attacks are a growing ...
The rapid evolution of MDM solutions
E-Zine
Mobile device management (MDM) continues to grow at a feverish pace, both in terms of adoption and mobile security features. BYOD policies, and the ...
Security Management Strategies for the CIO