Software:SekChek Local

From HandWiki
Revision as of 22:33, 14 September 2021 by imported>TextAI (correction)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Short description: Computer-aided audit tool
Sekchek
Initial release2006; 18 years ago (2006)[1]
TypeComputer Security
LicenseProprietary
Websitesekchek.com
As ofNovember 2018

SekChek security audit and benchmarking toolset dating from 1996.

History

SekChek was formed by former auditors from Deloitte and Touche in 1996.[1][2] The toolset was a set of automated processes to analyze the logical security profile of a computer.[3]

On 20 March 2018 SekCheck's website gave notice operations would cease on 31 May 2018. Reasons cited included SekCheks' business model being less relevant to the business environment in 2018, a surge in compliance and regulatory requirements including GDPR and monetary difficulties due to losses with the insolvency of a credit-card processor.[4]

Products

The SekChek Classic product gathered information on a host which would then be sent encrypted to SekChek for report processing and enable checking security policies had been correctly configured.[5][6] This originally worked on AS/400 but the number of platforms were extended in the next two years to encompass ed to Windows, Netware and Unix.[2] Reports anonymously compared machines against the average from similar industry computers.[5][7] The company introduced the Local version of its product in 2008 which avoided the need send data off-site.[2][8] For windows there was a utility to specifically audit the Active Directory (AD) at domain level rather that at server level which was analyzed by the SAM tool.[9][10]

Reception

The product was initially marketed as a security evaluator and was noted for providing comprehensive reports of the security vulnerability of a computer system.[11]

References

  1. 1.0 1.1 Bosavage, Jennifer (June 7, 2006). "New Service Seeks Out Security Gaps". Dark Reading. TechWeb (United Business Media). http://www.darkreading.com/security/vulnerabilities/showArticle.jhtml?articleID=208804683. Retrieved May 20, 2009. 
  2. 2.0 2.1 2.2 "A Brief History". https://www.sekchek.com/history.htm. 
  3. "IT Security Review Services - SekChek". http://www.deloitte.com/dtt/section_node/0,2332,sid%253D34783,00.html. 
  4. "Notice of SekChek's closure on 31 May 2018". https://www.sekchek.com/press-release.htm. 
  5. 5.0 5.1 "SekChek Provides Independent Reality Check of OS Security" (Press release). Tippit Inc. 27 June 2006. Archived from the original on 3 March 2016. Independent, objective, and reliable evaluation of a company's computer security is the key deliverable of SekChek
  6. "Computer Security Evaluator SekChek Announces Compatibility with Microsoft Windows Vista" (Press release). DABCC. 5 October 2007. Archived from the original on 4 March 2016.
  7. "SekChek Marks 10-Year Anniversary, Providing Unique Security Assessment Tools" (Press release). SpecialNoise. 26 June 2007. Archived from the original on 3 March 2016.
  8. "Compare Classic Software" (PDF). SekChek Classic. http://www.sekchek.com/compare-local-classic-tools.htm. 
  9. "AD Product Specifications" (PDF). SekChek Local. http://www.sekchek.com/downloads/product-specification-sekchek-local-active-directory.pdf. 
  10. "SAM Product Specifications" (PDF). SekChek Local. http://www.sekchek.com/downloads/product-specification-sekchek-local-sam.pdf. 
  11. Kearns, Dave (10 May 2006). "SekChek evaluates security". Network World (International Data Group). http://www.networkworld.com/newsletters/nt/2006/0508nt1.html. Retrieved 20 May 2009. 

| last = Carroll | first = Mariana | date=November 2006 | title = An Information Systems Auditor's Profile | journal = UNISA Dissertation | url = http://etd.unisa.ac.za/ETD-db/theses/available/etd-06182007-143905/unrestricted/dissertation.pdf | format = PDF | quote = These reports can be used to identify weaknesses as well as risk ratings and suggested corrective actions. These statements are supported by Mookhey (2004) when he asserts that "the use of these tools for security auditing is prevalentand driven mainly by the inherent complexity within information systems.

External links