Access "Identity Management: Apere's IMAG 500"
This article is part of the January 2007 issue of Keep today's threats close and tomorrow's closer
IDENTITY MANAGEMENT IMAG 500 REVIEWED BY BRAD CAUSEY Apere Price: $15,000 for a single device @exb @exe Apere's IMAG 500 appliance aims to simplify the complex maze of identity management through the automatic discovery of distributed identity stores, consolidation, reconciliation and provisioning of all user accounts, and access to practically all network resources through a single control point. It's an attractive proposition, but we found the implementation rough going. Configuration/Management D Setup was difficult, ultimately requiring the company's technical support to remotely access the device to assist with the configuration process. Although Apere claims that the device can learn the location and type of applications, each application required manual configuration. Basic device configuration is like any other appliance: You set up DNS servers, email servers, log servers and VLANs. Things got sticky when we tried to add authentication resources and user stores, particularly for Web applications. Because user accounts don't generally live on the Web ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
How to setup and configure syslog to view and filter data
Your network devices are trying to tell you that you're under atta ck. Syslog helps you sort through the data overload and get the message.
-
SonicWALL SSL VPN 4000 product review
In this product review of SonicWALL SSL VPN 4000 security tool and appliance get information on setup, pricing, configuration, installation, remote access and policy features.
-
UTM product review: WatchGuard Technologies' Firebox X 1250e
WatchGuard Technologies' Firebox X 1250e
-
Identity Management: Apere's IMAG 500
Apere's IMAG 500
-
Mixed Signals
by Mark Baard
RFID gives businesses-and bad guys-an easy way to track and change information.
- View Point
-
How to setup and configure syslog to view and filter data
-
-
Core Security Technologies Core Impact 6.0 security tool review
In this product review, learn how Core Security Core Impact 6.0 tool can assist in ethical hacking a penetration testing, and get info on setup, reporting and management.
-
Virtual Threats
by Dennis Fisher
Virtual machines save you money in the data center, but can you ignore their security implications any longer?
-
Recent Releases: Security product briefs, January 2007
Read about the security products that launched in January 2007.
- At Your Service: January 2007 managed services security news
-
Face-Off: Schneier, Ranum debate privacy and personal information
Does Secrecy Help Protect Personal Information?
-
Who's There?
Enterprises have a pressing need for endpoint security, but choosing a system that screens PCs before allowing them network access requires careful consideration.
-
Core Security Technologies Core Impact 6.0 security tool review
-
Columns
-
Ping: Nikk Gilbert
Nikk Gilbert
-
Editor's Desk: Celebrating 10 years of Information Security magazine
A Toast to Ten Years
-
Face-Off: Schneier, Ranum debate privacy and personal information
Does Secrecy Help Protect Personal Information?
-
Perspectives: Post-admission controls the next step for NAC
Post-admission controls would shore up NAC/NAP shortcomings.
-
Ping: Nikk Gilbert
More Premium Content Accessible For Free
Next-generation firewalls play by new rules
E-Zine
Firewalls started their journey to the next generation at about the same time as the Star Trek TV series. While the products have advanced with ...
Developing your endpoint security management transition plan
E-Handbook
This TechGuide will help you develop your endpoint security management transition plan. Articles focus on overcoming the challenges of Web-based ...
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Security Management Strategies for the CIO