I would be cautious of all in one solutions. While it is a pain to
mngt multiple solutions, often the stand alones are more comprehensive
and stable.

I have no experience with the product you are using so just my opinion
based on general experience.

Also consider post xp sp2 firewall mgmt via GPO is a breeze. Win7 adds
even more and so far testing is solid.

Xp sp3 and beyond adds GPO support for 802.1x and vista/win7  nap. Its
not without its quirks but most NAC implementations regardless of
vendor take some planning, testing, and patience - rinse and repeat

Pgp wde is solid but expensive few limitations but their support Is solid

If you end up looking at any of these, ping me and I can save you
shi... ton of time with some details and experiences

That goes for anyone on the list



On 10/20/09, Robert Miller <[email protected]> wrote:
> Hello,
>
> We use ESET and I would not recommend this for anyone, I have passed known
> virus files passed it that Symantec caught and I don't think very highly of
> Symantec.
>
> For a HIDS solution look into http://www.ossec.net/ we are testing it and so
> far it is turning out to be nice.
>
> We also use Truecrypt for encrypting containers and store important files in
> that container.  There are ways around it but works well enough for what we
> use it for, I have not done extensive testing on the whole disk encryption
> but I know others here have.
>
> Hope this helps,
>
> - Robert
> (arch3angel)
>
> Aaron Appelbaum wrote:
>>
>> Hello List,
>>
>> I am evaluating migrating to a new AV/endpoint solution for my enterprise.
>> We are a Microsoft/AD shop. I was hoping that the list would share their
>> frustrations, successes, and opinions with some of the endpoint solutions
>> that are currently on the market. I have listed below the features that we
>> may or may not utilize, ordered by their importance level.
>>
>> The solutions that I am currently testing include Sophos, and ESET. Is
>> there anything negative that you have experienced with Sophos or ESET?
>>
>> Features in Order of Importance
>> 1.       AV protection
>> 2.       Spyware protection
>> 3.       Reporting
>> 4.       Ease of policy configuration
>> 5.       Firewall
>> 6.       HIPS/HIDS
>> 7.       Encryption
>> 8.       NAC
>>
>> Thanks,
>>
>> Aaron
>>
>> ________________________________
>> _______________________________________________
>> Pauldotcom mailing list
>> [email protected]
>> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
>> Main Web Site: http://pauldotcom.com
>
>
>

-- 
Sent from my mobile device
_______________________________________________
Pauldotcom mailing list
[email protected]
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com

Reply via email to