contents

software
 
Altiris Announces a New Security Solution

Altiris Inc. has announced a new security solution for the centralized management of passwords and user and group permissions. Altiris Local Security Solution complements Altiris security configuration management solutions to help IT organizations protect valuable corporate data and computing systems.

Forrester Research recently surveyed 149 technology decision-makers at North American companies about IT security threats and the technologies they will put in place to mitigate them. According to this Forrester survey, "Security chiefs' cups will continue to overflow in 2006, with malicious code wreaking havoc, information thieves violating customer confidentiality, and hackers infiltrating corporate networks. Information assets are in jeopardy. More than 60 percent of companies...cited poor protection of their information assets as a security concern".

Local Security Solution addresses the effective management of locally defined user accounts and group memberships. As part of any Windows-based system deployment, companies must secure accounts with local administrative rights to the computer. Too often, large enterprises define a single, static password for use across thousands of workstations or servers. Considering that even complex passwords can be easily compromised, common password disclosure can put an entire enterprise at risk.

Local Security Solution allows administrators to:
- Detect compliance errors
- Limit unauthorized users and groups from accessing sensitive systems and data
- Enforce consistent local account memberships
- Randomize passwords based on strong password criteria
- Cycle passwords on a predetermined schedule

Local Security Solution adds a key component to the unique, multi-layered Altiris approach to security and configuration management. Altiris security solutions help protect business assets against human, network and system-level threats and vulnerabilities. Altiris solutions are aligned with industry best practices and processes to help ensure computing system security from rapidly proliferating threats.



write your comments about the article :: © 2006 Computing News :: home page