Access "Akonix Systems' Akonix A-Series Product Review"
This article is part of the August 2006 issue of Special manager's guide: Monitoring identities
INSTANT MESSAGING Akonix A-Series Akonix Systems Price: Hardware starts at $4,995; $20-$35 per user licensing, depending on features @exb @exe The Akonix A-Series IM security appliances give enterprises control of instant messaging, a runaway app that can leave a yawning network security hole, and peer-to-peer traffic, a serious bandwidth hog and malware vector plaguing corporate networks. The A6000 we tested (the A1000 is aimed at SMBs) is enterprise-class hardware, with multiple network interface cards for clustering and a redundant hard drive. The A-Series runs AkOS, a proprietary hardened operating system based on the Linux 2.6 kernel, specifically designed for real-time messaging. Configuration/Management: C The appliance is easy to install and set up--if you can get your hands on the documentation. The box ships with a mere three-page guide that gets you through initial appliance logon. When you request a login and one is not automatically generated, you are directed to the Support Center on the Akonix Web site for access to the users' manual. The site... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
- What's a Hot Pick?
-
Single Sign-On Explained
SPECIAL Managing identity and access can be as easy as 1, 2, 3.
1 is the loveliest number -
It's a Dirty Job...
SERVICES But someone has to handle vulnerability management. Giving it to an outsourcer seems like an easy solution, but enterprises need to first understand the gritty details.
-
Security Event Management
Check Point Software Technologies' Eventia Analyzer 2.0 and Eventia Reporter
-
Web Application Break-In
THREATS It's time to protect online assets from increasing attacks.
-
Buyers look for demonstrable success in innovative companies
Cool Tech Ain't Enough.
-
Akonix Systems' Akonix A-Series Product Review
In this product review, get information on instant messaging (IM) Akonix Systems' Akonix A-Series appliance. Get tips on configuration, installation, reporting and policy control.
-
Vendor Security Product News and Updates
Learn about the latest products and security updates from vendors like Crossbeam, Airmagent and Marshal. Get pricing information as well as setup and installation tips.
-
- At Your Service: August 2006 managed services security news
- Events: Information security conferences for August 2006
-
User authentication options: Using two factor authentication for security
Discover how using two-factor authentication can improve organizational security. Weigh your authentication options and choose the right product for your enterprise.
-
Three Pitfalls to Avoid
SPECIAL Managing identity and access can be as easy as 1, 2, 3.
3 strikes, you're out -
IDP/Network Access Control
ForeScout Technologies' CounterACT
-
Secure Reads: Steganography and the art of covert communication
Read a quick review of the book, Hiding in Plain Sight: Steganography and the Art of Covert Communication.
-
Instant Messaging: Symantec IM Manager 8.0
Symantec's IM Manager 8.0
-
Columns
-
Editor's Desk: Consolidation is in
Synergistic Solutions
-
Layer 8: Personal devices put enterprise data at risk
Creeping Consumerization
-
Perspectives: Frame security as a business concept
Security efforts are considered operational, even when CISOs manage to interact with executives.
-
Ping: Heidi Kujawa
Heidi Kujawa
-
Editor's Desk: Consolidation is in
More Premium Content Accessible For Free
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Emerging threat detection techniques and products
E-Handbook
Advanced persistent threat (APT) has been a used and abused term in the security industry, but security experts say targeted attacks are a growing ...
The rapid evolution of MDM solutions
E-Zine
Mobile device management (MDM) continues to grow at a feverish pace, both in terms of adoption and mobile security features. BYOD policies, and the ...
Security Management Strategies for the CIO