Access "Configuration Management: Configuresoft's Enterprise Configuration Manager v4.7"
This article is part of the December 2005 issue of Top forensics tools for tracking down cybercriminals
Enterprise Configuration Manager v4.7 Configuresoft Price: Starts at $995 per managed server and $30 per managed workstation @exb Enterprise Configuration Manager v4.7 @exe In October 2004, we reviewed Configuresoft's Enter-prise Configuration Manager (ECM) v4.5 and were impressed with the system's ability to aggregate Windows system configuration information, remediate deficiencies and provide detailed reports across the enterprise. This very good product has gotten better. In v4.7, Configuresoft has added the ability to scan and report on *nix systems, building on its excellent support for Windows hosts. Our tests showed that the new agents functioned properly and provided valuable reporting. However, the Unix/Linux and Windows management systems are in separate menu trees, giving them the feel of two separate systems. We'd like to see an integrated configuration management solution. Our sole complaint last year was v4.5's lack of high-level configuration reports. Configuresoft listened to this criticism and revamped its reporting capabilities. Security ... Access >>>
Premium Content for Free.
Building A Perimeter Defense With Application-Level Firewalls
Learn how application level firewalls, when carefully deployed, can build perimeter defenses and prevent hackers from exploiting vulnerabilities, such as application code, to achieve attacks.
To Catch a Thief
Forensics tools aren't only used in high-profile cases.
On the Mend
Health care giant Novartis AG got a much-needed shot in the arm with a comprehensive risk assessment and revamped security management system.
Recent Releases: Security product briefs, December 2005
Learn about the security products released in December 2005.
Controlling the Uncontrollable
Organizations must leverage policy, and harness new protocols and technology to tame wild WLANs.
Information Security's 2006 Priorities Survey signals a transition for security managers from an operational to a more strategic stance.
- Building A Perimeter Defense With Application-Level Firewalls
Hot Pick: Citrix Systems' Citrix Access Essentials
Citrix Systems' Citrix Access Essentials
SSL VPN: Array Networks' Array SPX5000
A review of Array Networks' Array SPX5000
Configuration Management: Configuresoft's Enterprise Configuration Manager v4.7
Configuresoft's ECM v4.7
Application Security: Cenzic's Hailstorm v2.6
Cenzic's Hailstorm v2.6
Secure Reads: Mergers and Acquisitions Security
Read a review of the security book Mergers and Acquisitions Security.
- Hot Pick: Citrix Systems' Citrix Access Essentials
On The Radar: Security technology can't solve process problems
Perspectives: History teaches security lessons well
Expert Richard Bejtlich looks at the lessons learned in engineering disasters and applies them to information security.
Editor's Desk: Security for the corporate brand
Know Thy Business
Ping: Desiree Beck
- On The Radar: Security technology can't solve process problems
More Premium Content Accessible For Free
FTP gets big files to colleagues and clients fast, but as the headlines remind us, the threat of electronic break-ins is real. This guide to secure ...
As tablets and smartphones become more integrated into business environments, CISOs are scrambling to put effective countermeasures in place. But too...
This Technical Guide examines the necessary elements of, and how to implement, a sound mobile device management strategy. Devices will be lost...