Access "Secure Computing SafeWord 2008 product review"
This article is part of the May 2008 issue of Seven questions to ask before committing to SaaS
AUTHENTICATION Secure Computing SafeWord 2008 REVIEWED BY SANDRA KAY MILLER SafeWord 2008 Price: Starts at $99 per user; includes token, server license and first year support; $4,995 for optional Enterprise Solution Pack Passwords, though easy to deploy, are no longer effective for remote access to critical applications; increasingly, organizations are turning to two-factor authentication, such as passwords coupled with tokens. In the latest version of SafeWord, Secure Computing delivers identity management and access using tokens that generate secure single-use passcodes that cannot be stolen or hacked to complement existing remote access infrastructure such as VPNs. SafeWord is designed specifically for Microsoft Windows platforms (XP, Vista, 32 and 64-bit) and supports a variety of remote access products including Citrix, Cisco, Check Point Nortel, Juniper, F5, Aventail and any other RADIUS-based VPNs, making it an excellent channel up-sell for enhanced security. Configuration/Management A It was obvious to us that from the start SafeWord 2008 was ... Access >>>
Premium Content for Free.
SaaS Offering Handles SSO
TechFocus: New Password Hell?
- Viewpoint: Let's add policy to GRC
Product review: CodeArmor 2.2 for Microsoft .NET
by Steven Weil, Contributor
The configuration, policy control and reporting capabilities of V.i. Labs' CodeArmor 2.2 for Microsoft .NET are reviewed.
Security Services: Webroot Email Security SaaS
At Your Service
Identity Management Suites Enable Integration, Interoperability
IDENTITY MANAGEMENT Feature-rich product suites are putting a face on integration and interoperability.
- SaaS Offering Handles SSO
Secure Computing SafeWord 2008 product review
Secure Computing SafeWord 2008 delivers identity management and access control for Windows systems using tokens that generate secure single-use passcodes. Information Security magazine reviews these capabilities.
7 Security Questions to Ask Your SaaS Provider
Outsourcing software as a service (SaaS) puts control over an organization's applications in the hands of others. Learn what questions to ask your provider, how to define security policies, how to understand how service providers handle security and ensure enforcement of policies.
Product review: Symantec Database Security 3.1
5 Steps for Developing Strong Change Management Program Best Practices
Poor change control and configuration management can affect the security of your systems and networks. Follow these five steps for a strong change management program.
Product review: Mandiant Intelligent Response 1.0
- Secure Computing SafeWord 2008 product review
Interview: Jim Kirkhope of NCR
PING: Jim Kirkhope
Face-Off: Is vulnerability research ethical?
Bruce Schneier and Marcus Ranum debate the ethics of vulnerability research
Reasearch on Coding Backdoors Presents Ugly Picture
Editor's Desk: Backdoor Bedlam
Security, Privacy Offices Must Combine Resources
Perspectives: Nowhere to Hide
- Interview: Jim Kirkhope of NCR
More Premium Content Accessible For Free
Deploying data protection technologies properly requires a lot of time and patience. While most firms can get started by using preconfigured policies...
The bring your own device (BYOD) movement, which has flooded the enterprise with employee-owned smartphones, tablets, phablets and purse-sized ...
For so long penetration testing meant hiring an expert to use skill and savvy to try to infiltrate the company system. But, as with most ...