Compaq 108164-003 - ProLiant - 800 White Paper page 17

Compaq enterprise security framework
Hide thumbs Also See for 108164-003 - ProLiant - 800:
Table of Contents

Advertisement

W
P
HITE
APER
(cont.)
. .
. .
. .
. .
. .
. .
. .
Smartcards/
. .
. .
Security Dynamics
. .
. .
Siemens Nixdorf
. .
Schlumberg
. .
. .
. .
. .
Network Hardware
. .
. .
Bay Networks
. .
. .
. .
. .
. .
. .
. .
Encryption
. .
Hardware
. .
. .
. .
. .
Concord
. .
. .
. .
. .
Corporation
. .
(Tandem )
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
Hardware
. .
. .
. .
. .
Cross-vendor usage, ease of use, interoperability, and practical applicability remain crucial issues.
. .
. .
Firewalls provide some examples of the problems around ease of use and interoperability. While
. .
the industry has recently made strides in its interfaces and simplicity, configuring and managing
. .
. .
firewalls remains a complex task for most IT managers. Similarly, very few firewalls interoperate
. .
with each other, specifically in the areas of virtual private networking (VPN).
. .
. .
. .
The final limitation in many security offerings is their lack of focus on the practical security
. .
concerns of enterprises. While many vendors have pieced together point solutions or introduced
. .
. .
broad, far-reaching frameworks, they have ignored the real requirements of and constraints placed
. .
upon enterprise IT managers, such as:
. .
. .
In an enterprise with multiple platforms and the eventuality of working with other enterprises
. .
. .
over public networks, IT managers security solutions must be based on open, interoperable
. .
standards, not proprietary systems.
. .
. .
. .
Enterprises need a clear migration path from their currently limited security solutions to the
. .
most comprehensive solutions possible, with stops along the way depending on their various
. .
. .
levels of need.
. .
. .
The current offerings of most system vendors do not address these concerns.
. .
. .
. .
. .
. .
17
— Example Companies —
Authentication
Servers
Tokens
Security Dynamics
Enigma Logic
Leemah Datacom
CheckPoint
Cisco
3Com
Computing
Encryption
RSA
Cylink
Entrust
Terisa
VPNet
Ti m eStep-
PERMIT
Intel
Aladdin
Software
Eracom
NetLock
(div. of
Atalla
Hughes)
Leemah Dt
D igital Si g nature
RSA
Cylink
Entrust
Auditing/Management
Software
Figure 12
Certificate
Authorities
VeriSign
CyberTrust
(GTE)
Entrust
Firewalls
Raptor
Secure
VPN
Services
AT&T
Sprint
PSINet
Virus
MFS
Protection
Symantec
McAfee
Cheyenne
Haystack
ISS
M C I
Services

Advertisement

Table of Contents
loading

Table of Contents