Understanding workstation analysis and security policy

Workstation analysis and security policy are the key features proposed by UAG to provide security at the application layer. Whereas firewall will operate at the network layer (filter by IP or TCP Port range), the application layer will look at “what” the user is trying to do and will correlate a lot more information in…

0

How to detect Skyrecon software in IAG

By default, IAG is capable of detecting a wide range of software on the client side. What happen if the software I want to check is not in the list ? I had that constraint with one of my partners, Skyrecon Here is the methodology we used : 1) asked the partner to create a…

0

Extending client-side analyzis (example : Test Registry Key)

  IAG is able to inspect your workstation and then later, per application, verify if you are compatible with the security policy.   For example, you want to make sure that only “corporate” machine can access ApplicationA, but everybody (of course after authentication) can access applicationB… etc.   You can go even deeper, and specify…

0

Tracing Client-side

  When you connect IAG for the first time a “client”  (in fact a bunch of sub components) are installed on the machine (there are other ways to install the client than online install). Later they will be loaded when needed when you connect IAG, or load application that are tagged as “high secure”.  …

0

Display end-point detection variables on the client-side

When you connect an IAG portal, a client-side component will inspect your workstation and will take a “technical picture” of your machine.   This “picture” will contain by default more than 200 checks and can be extended quickly to cope with your own security constraints.   Once this analysis is finished, IAG will constantly use…

0