Premium Content

Access "Product review: nCircle Configuration Compliance Manager"

Published: 22 Oct 2012

POLICY MANAGEMENT nCircle Configuration Compliance Manager REVIEWED BY BRENT HUSTON nCircle Price: Management server, $20,000, plus $199 per monitored server, $199 per network device and $49 per other assets @exb @exe Riding herd on the integrity of your security infrastructure is not an option--it's a necessity. But keeping your IT assets in compliance in a large, complex environment is daunting without automated tools. nCircle Configuration Compliance Manager (formerly Cambia CM prior to nCircle's acquisition of Cambia Security in May) brings policy policy compliance and security management together into one centralized suite, helping cut the job down to size. Configuration/Installation B+   Installation is straightforward, either on a single server or multiple systems. nCircle's agentless technology simplifies the process. Configuration Compliance Manager accepts data from nCircle's IP360 solution, as well as third-party vulnerability assessment scanners, such as Nessus, IBM ISS Internet Scanner and QualysGuard, allowing you to integrate existing tools. ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features
    • Product review: Unified threat management (UTM) devices

      Unified threat management devices consolidate several network security functions into one product. This article evalutes six UTM appliances; each had to act as a firewall and virtual private network and provide antivirus, Web content filtering, intrusion prevention and antispam protection.

    • SIMs maturing and suitable for mid-market

      Security information management systems (SIMs) tools have expanded with more capabilities such as active threat response. The broadening of the technology will provide security managers with a sharper view of their overall security posture.

    • Encryption key management blunders can render deployments useless

      Encryption sounds like an ideal way to protect data but key management, including accountability, training, and enforcement of password complexity, are challenging.

    • Product review: Identity Engines' Ignition Server

      Identity Engines' Ignition Server manages access controls across disparate directory services platforms (Active Directory, LDAP, eDirectory) by consolidating them into a single user store.

More Premium Content Accessible For Free