Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Ever-Present Security Concerns Spur Market Growth: Page 6 of 14

Combined, Okena StormWatch 3.0 and StormFront 2.0 provide some of the best protection and configuration features we've seen in this emerging market. Okena StormWatch, now Cisco Security Agent since Cisco Systems' acquisition of Okena last month, tracks an application's access to system resources, such as file, registry, network and COM components, and lets applications perform only authorized actions. And, unlike some rivals, Security Agent can protect any application.

Building policies to define all allowed activities can be a nightmare because applications can access hundreds or even thousands of system objects during run-time. But with Security Agent, the process is greatly simplified: Security Agent Profiler tracks an application's activity and creates a template showing the system access, relieving administrators of most data-gathering work. Once the policy is installed and running, Security Agent allows only authorized activities and logs all unauthorized access attempts. Factor in administrative audit trails and an easy-to-use interface, and Security Agent and Security Agent Profiler turn a very complex process into a walk in the park.

Finalists:

• eTrust Access Control 5.1, Computer Associates, (800) 225-5224, (631) 342-6000. www.ca.com

• STAT Neutralizer 1.2, now shipping 2.0, Harris Corp., (888-725) STAT, (321) 727-9100. www.STATonline.com

Application Firewalls