PRO+ Premium Content/Information Security magazine

Thank you for joining!
Access your Pro+ Content below.
June 2007

Product review: nCircle Configuration Compliance Manager

POLICY MANAGEMENT nCircle Configuration Compliance Manager REVIEWED BY BRENT HUSTON nCircle Price: Management server, $20,000, plus $199 per monitored server, $199 per network device and $49 per other assets @exb @exe Riding herd on the integrity of your security infrastructure is not an option--it's a necessity. But keeping your IT assets in compliance in a large, complex environment is daunting without automated tools. nCircle Configuration Compliance Manager (formerly Cambia CM prior to nCircle's acquisition of Cambia Security in May) brings policy policy compliance and security management together into one centralized suite, helping cut the job down to size. Configuration/Installation B+   Installation is straightforward, either on a single server or multiple systems. nCircle's agentless technology simplifies the process. Configuration Compliance Manager accepts data from nCircle's IP360 solution, as well as third-party vulnerability assessment scanners, such as Nessus, IBM ISS Internet Scanner and QualysGuard, allowing you ...

Access this PRO+ Content for Free!

By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Features in this issue

  • SIMs maturing and suitable for mid-market

    Security information management systems (SIMs) tools have expanded with more capabilities such as active threat response. The broadening of the technology will provide security managers with a sharper view of their overall security posture.

  • Product review: nCircle Configuration Compliance Manager

    nCircle Configuration Compliance Manager brings policy compliance and secuirty management into one centralized software suite. It provides vulnerability scanning via third-party scanners such as Nessus. This product review rates the software's ease of installation, features and effectiveness.

  • Encryption key management blunders can render deployments useless

    Encryption sounds like an ideal way to protect data but key management, including accountability, training, and enforcement of password complexity, are challenging.

Columns in this issue