What Are The Sunbelt Top 10 Bestsellers?
These are the results from March 2003:
You can find evals for all of these tools here:
- Double-Take: Real-time (and open file) data protection.
- Sunbelt Remote Admin: a superfast remote control program.
- UpdateEXPERT: Service Pack and Hotfix Manager for Windows.
- ScriptLogic: Sick and tired of messing with login scripts?
- iHateSpam: Eliminate Annoying Spam. Client and Server based.
- NTAccess: Reset lost administrator passwords.
- sonicAdmin: Network Management from the Palm of Your Hand.
- Active Administrator: Active Directory OU Management.
- PestPatrol Corporate Edition: Powerful anti-hacker utility.
- Retina: Scan for the latest vulnerabilities on your networks.
Results From Data Protection Survey
We want to thank those of you that responded to the recent
survey on data protection and replication. We have gathered the
results and there are some interesting nuggets that we would
like to share with you. There was an interesting mix of data
protection implementations, ranging from the standard tape
solution to the more progressive disk-to-disk mirroring choices
But, tape was clearly the solution of choice for the majority of
respondents, although 24% of those that responded acknowledged
that remote data protection was a key concern for them, while 50%
have been dealing with the challenge of a shrinking window in
which backups need to be completed.
From a cost of down-time perspective, the answers were highly
varied where the responses ranged from "infinite" to "unknown".
But, nearly 80% of the group knows that their e-mail and database
servers are the most critical to protect. From a remote protection
perspective, 60% believe that they have enough bandwidth to complete
the solution if required, which was contrary to our assumption
before the poll results were tabulated. Finally, 72% of the folks
believe that data replication is a moderate to enormous headache
to execute, while 77% feel that creating an effective high-availability solution is a moderate to enormous headache.
Thanks again for taking the time to complete the poll and we
hope these results have been helpful for you as you map your
data protection strategy with your business requirements.
Here are the leading HA/DR solutions:
What Is New With Active Administrator?
Active Administrator 3.0 will come out soon, which will include
several new features which GPMC (the free MS tool) does not. These
are mostly related to Active Directory Security, Auditing, and
Group Policy version history.
The initial release will be available at the end of April. This
includes the ability to keep a log of exactly who is changing
Active Directory. This includes the creation, deletion, and
modification of all objects in Active Directory, Users, Groups,
Group Membership Changes, Group Policy Objects, Computers, etc...
Optional email alerts can occur when any specific event is
triggered. All events are logged to a centralized MS SQL 2000
database for review / reporting.
From this auditing, we can tell when a Group Policy is changed,
and WHO changed it. When this trigger occurs, we create a new
backup of the GPO and mark it as a new version. You can run reports
on older versions and rollback if necessary. Shortly we will have
this so that you can run diff reports between versions, etc...
This way you have any change to your GPOs instantly backed up and
documented, including WHO did the modification. Check out Active
Admin V 2.7 over here:
"Why Is UpdateEXPERT Superior Over XML-based Tools?"
We got this question from one of our customers. Here is the answer!
St. Bernard Software has a metadatabase of patches much larger
than the XML database. If you exclude the private patches in
UpdateEXPERT, as of March 18, the number of patches available from
UpdateEXPERT is 1666. With private patches, we have 2066 patches
(plus, a customer can have us add a private patch if it is needed).
The total number of security patches is 948. The total number of
patches available in the XML database is 784. This means the XML
database does not include all security patches and any of the other
patches that UpdateEXPERT offers today.
Most "enterprise" customers have the requirement to manage servers
(and some workstations) that are isolated or otherwise locked down.
In order to accomplish this task, an agent is required. UpdateEXPERT
6.0 fulfills this requirement. In addition, version 6.0 offers
the agent as an option. Based on feedback from 6.0 BETA sites,
we know that customers prefer to deploy agents only when necessary.
This is an exclusive for UpdateEXPERT, as no other agent-based
patch management product offers the agent as an option. Customers
can use UpdateEXPERT in a wide number of configurations, with
agents, without or both. (see deployment guide)
While some of our competitors like to talk about immediate release
of the XML database, we add value by understanding the inter-dependencies for a broader set of patches much larger than the XML database. Ultimately, if a customer requires the immediate deployment of a patch, UpdateEXPERT includes an easy to use "custom install" feature. As for ease of use, other products
may appear to have an upper edge here, but then again, these
other products are managing half as many patches. Check out the
most recent deployment guide in the White Papers, Documents and
Other Files Section here:
Businesses Responsible for Personal Data
Beginning July 2003, California agencies and private companies
will be held responsible for the theft of confidential personal
data stored on their networks. Senate Bill 1386 requires customers
to be notified following any unauthorized access to their personal
data. Personal Data is defined as the first and last name and any
other related identification, such as social security number,
credit card, or driver's license.
Since the law covers any agency, person, or business that conducts
business in California, it effectively covers the entire U.S. As a
result, all businesses will be exposed to increased risks, including:
If you do business in California and store confidential personal
data it is imperative that you take immediate steps to increase
the security of your data.
- Civil litigation- from customers seeking damages from breach of
contract and identity theft.
- Loss of consumer confidence- from public exposure to security
How does data theft occur?
Recent studies indicate that adults spend more time on personal
Internet activity at work than at home. This includes surfing,
email, and IM. Each of these activities exposes a computer and
network to infection by spyware. Once spyware has found its way
onto a network, it's a simple thing for the spyware to secretly
explore and snatch data, then transmit that data outside the
network to third parties.
What is Spyware?
Spyware is a category of malicious code that invisibly gathers
and exports computer data without the user's knowledge. Included
in this category are Remote Access Trojans (RATS), key loggers,
and hacker tools. Spyware is not detected by anti-virus software,
firewalls, or intrusion detection systems. Spyware can sit
silently on your system for long periods without detection and
gather anything from keystrokes to customers' credit card numbers.
Without the knowledge or consent of the user, this data can be
shipped to someone waiting for it outside the network.
How can you protect yourself from spyware?
The only way to prevent infection from spyware is to use software
specifically designed to detect it. PestPatrol not only detects
spyware, but also allows you to quarantine or clean your system
as well. PestPatrol's archive of 70,000 signatures also notifies
you of cookies, adware, and other "pests" planted on your network
to gather user data for distribution and use by third parties.
Any system can be victimized spyware and other pests. To learn
more about spyware and PestPatrol, and check out the Corporate
Edition, go to: