HP ProLiant 4500 Compaq Enterprise Security Framework - Page 17

Example Companies

Page 17 highlights

WHITE PAPER (cont.) Systems Consulting, Security Audit and Testing Andersen Worldwide, Deloitte and Touche, Coopers and Lybrand, Bellcore, Booz,Allen & Hamilton, Ernst & Young, Gemini Computers ... -Example Companies - Identification & Authentication Desktop/Server/Laptop Hardware Security MicroSystems-LOCKIT PC Guardian Authorization/ Access Control Smartcards/ Tokens Security Dynamics Siemens Nixdorf Schlumberg Network Hardware Cisco Bay Networks 3Com Encryption Hardware Intel Concord Eracom Atalla Corporation (Tandem) Authentication Servers Security Dynamics Enigma Logic Leemah Datacom Encryption RSA Cylink Entrust Terisa VPNet TimeStepPERMIT Aladdin Software NetLock (div. of Hughes) Leemah Dt Firewalls CheckPoint Raptor Secure Computing Virus Protection Symantec McAfee Cheyenne Secure OS, Environments Gradient Certicom Open Horizons Entrust Azzelia Entegrity Computer Associates Certificate Authorities VeriSign CyberTrust (GTE) Entrust VPN Services MCI AT&T Sprint PSINet MFS Privacy Accountability Integrity Digital Signature RSA Cylink Entrust Hardware Auditing/Management Haystack ISS Software Figure 12 Services Cross-vendor usage, ease of use, interoperability, and practical applicability remain crucial issues. Firewalls provide some examples of the problems around ease of use and interoperability. While the industry has recently made strides in its interfaces and simplicity, configuring and managing firewalls remains a complex task for most IT managers. Similarly, very few firewalls interoperate with each other, specifically in the areas of virtual private networking (VPN). The final limitation in many security offerings is their lack of focus on the practical security concerns of enterprises. While many vendors have pieced together point solutions or introduced broad, far-reaching frameworks, they have ignored the real requirements of and constraints placed upon enterprise IT managers, such as: • In an enterprise with multiple platforms and the eventuality of working with other enterprises over public networks, IT managers security solutions must be based on open, interoperable standards, not proprietary systems. • Enterprises need a clear migration path from their currently limited security solutions to the most comprehensive solutions possible, with stops along the way depending on their various levels of need. The current offerings of most system vendors do not address these concerns. 17

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21

W
HITE
P
APER
(cont.)
17
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
Identification &
Authentication
Authorization/
Access Control
Privacy
Integrity
Accountability
Network Hardware
Cisco
BayNetworks
3Com
Smartcards/
Tokens
Security Dynamics
SiemensNixdorf
Schlumberg
Authentication
Servers
Security Dynamics
EnigmaLogic
LeemahDatacom
Virus
Protection
Symantec
McAfee
Cheyenne
Encryption
Hardware
Intel
Concord
Eracom
Atalla
Corporation
(Tandem)
Certificate
Authorities
VeriSign
CyberTrust
(GTE)
Entrust
Firewalls
CheckPoint
Raptor
Secure
Computing
Encryption
RSA
Cylink
Entrust
Terisa
VPNet
TimeStep-
PERMIT
Aladdin
Software
NetLock
(div. of
Hughes)
LeemahDt
VPN
Services
MCI
AT&T
Sprint
PSINet
MFS
Digital Signature
RSA
Cylink
Entrust
Hardware
Software
Services
—Example Companies —
Systems Consulting, Security Audit and Testing
Andersen Worldwide, Deloitte and Touche, Coopers and
Lybrand, Bellcore, Booz,Allen & Hamilton, Ernst & Young,
Gemini Computers
Desktop/Server/Laptop Hardware
Security MicroSystems-LOCKIT
PC Guardian
Secure OS, Environments
Gradient
Certicom Open Horizons
Entrust
Azzelia
Entegrity
Computer Associates
Auditing/Management
Haystack
ISS
Figure 12
Cross-vendor usage, ease of use, interoperability, and practical applicability remain crucial issues.
Firewalls provide some examples of the problems around ease of use and interoperability. While
the industry has recently made strides in its interfaces and simplicity, configuring and managing
firewalls remains a complex task for most IT managers. Similarly, very few firewalls interoperate
with each other, specifically in the areas of virtual private networking (VPN).
The final limitation in many security offerings is their lack of focus on the practical security
concerns of enterprises. While many vendors have pieced together point solutions or introduced
broad, far-reaching frameworks, they have ignored the real requirements of and constraints placed
upon enterprise IT managers, such as:
In an enterprise with multiple platforms and the eventuality of working with other enterprises
over public networks, IT managers security solutions must be based on open, interoperable
standards, not proprietary systems.
Enterprises need a clear migration path from their currently limited security solutions to the
most comprehensive solutions possible, with stops along the way depending on their various
levels of need.
The current offerings of most system vendors do not address these concerns.