Technical (Bottom-Up) Methodology 149
based tools, remember to verify each finding and be prepared to sort through
a huge number of vulnerabilities.
Enterprise Security Manager
URL: http://www/symantec.com
Price: $$$
Vendor’s comments: Symantec Enterprise Security Manager 5.5 provides
comprehensive security policy compliance management of mission-
critical E-business applications and operating systems across the enter-
prise. From a single location, it manages the discovery of policy
deviations and vulnerabilities for services housing mission-critical appli-
cations and data on the network, enterprisewide. With its intelligent
tools, administrators can quickly and cost effectively create baselines
and measure performance against those baselines to identify systems
that are not in compliance and correct faulty settings to bring systems
back into compliance.
Opinion: This tool allows the assessor to monitor several devices from one
central console. Agents can be installed and removed from systems
without requiring a reboot, and the number of operating systems is
spectacular.
SecurityAnalyst
URL: http://www.intrusion.com
Price: $$
Vendor’s comments: Intrusion SecurityAnalyst software is an agent-less
assessment tool that does not require the installation of software agents
on target systems. It is designed to provide centralized audit data of
all key Windows security features. With its built-in policy definition
and comprehensive reporting capabilities, SecurityAnalyst can help
administrators analyze network risks so they can take immediate cor-
rective action to safeguard network integrity.
Opinion: This is a good product for evaluating the effective security of a
Windows NT system.
NetIq’s Security Analyzer
URL: http://www.netiq.com
Price: $$$$
Vendor’s comments: NetIQ’s Security Analyzer is a flexible, enterprise-scale
vulnerability assessment product for Windows, Solaris, and Linux plat-
forms that protects your systems from costly downtime and security