I would be cautious of all in one solutions. While it is a pain to mngt multiple solutions, often the stand alones are more comprehensive and stable.
I have no experience with the product you are using so just my opinion based on general experience. Also consider post xp sp2 firewall mgmt via GPO is a breeze. Win7 adds even more and so far testing is solid. Xp sp3 and beyond adds GPO support for 802.1x and vista/win7 nap. Its not without its quirks but most NAC implementations regardless of vendor take some planning, testing, and patience - rinse and repeat Pgp wde is solid but expensive few limitations but their support Is solid If you end up looking at any of these, ping me and I can save you shi... ton of time with some details and experiences That goes for anyone on the list On 10/20/09, Robert Miller <[email protected]> wrote: > Hello, > > We use ESET and I would not recommend this for anyone, I have passed known > virus files passed it that Symantec caught and I don't think very highly of > Symantec. > > For a HIDS solution look into http://www.ossec.net/ we are testing it and so > far it is turning out to be nice. > > We also use Truecrypt for encrypting containers and store important files in > that container. There are ways around it but works well enough for what we > use it for, I have not done extensive testing on the whole disk encryption > but I know others here have. > > Hope this helps, > > - Robert > (arch3angel) > > Aaron Appelbaum wrote: >> >> Hello List, >> >> I am evaluating migrating to a new AV/endpoint solution for my enterprise. >> We are a Microsoft/AD shop. I was hoping that the list would share their >> frustrations, successes, and opinions with some of the endpoint solutions >> that are currently on the market. I have listed below the features that we >> may or may not utilize, ordered by their importance level. >> >> The solutions that I am currently testing include Sophos, and ESET. Is >> there anything negative that you have experienced with Sophos or ESET? >> >> Features in Order of Importance >> 1. AV protection >> 2. Spyware protection >> 3. Reporting >> 4. Ease of policy configuration >> 5. Firewall >> 6. HIPS/HIDS >> 7. Encryption >> 8. NAC >> >> Thanks, >> >> Aaron >> >> ________________________________ >> _______________________________________________ >> Pauldotcom mailing list >> [email protected] >> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom >> Main Web Site: http://pauldotcom.com > > > -- Sent from my mobile device _______________________________________________ Pauldotcom mailing list [email protected] http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com
