[comp.newprod] Security for Unix/Xenix

jbayer@ispi.UUCP (id for use with uunet/usenet) (09/08/88)

The following press release was sent out on July 11, 1988:


				NEW PRODUCT INFORMATION

				 FOR IMMEDIATE RELEASE



	    SUBJECT: `THE SENTINEL'...          CONTACT:  SAM BAYER, PRES.
		     SECURITY SOFTWARE          TEL. #:   (516) 766-2867
		     FOR XENIX/UNIX
		     OPERATING SYSTEM           DATE: JULY 11, 1988

				   MAJOR BREAKTHROUGH
			      REDUCES SECURITY SYSTEM COSTS
				    FOR XENIX/UNIX!!

	    Intelligent Software Products, Inc.  is pleased to announce the
	    availability  of  THE  SENTINEL  for  the  XENIX/UNIX operating
	    system.   THE SENTINEL,  our exclusive  new  security  software
	    system,   now  provides  complete,  reasonable  and  attainable
	    security for  XENIX/UNIX,  previously  only  available  in  the
	    $2,000-$20,000  RANGE.    THE  SENTINEL  is an advanced,  menu-
	    driven,  data communication security  system  which  completely
	    protects  the computer from any unauthorized entry.  It totally
	    secures all the communication lines allowed  by  the  operating
	    system.   It also limits users to specified terminals so access
	    will  be  denied  to  unauthorized  users.   Features  include:
	    multiple  passwords  per user,  callback telephone numbers (for
	    modem users), controlled access times,  allowable terminals and
	    various log files.   Throughout the entire process THE SENTINEL
	    is transparent to the operating system.

	    DESCRIPTION
	    THE SENTINEL controls all access to dial-up data networks.   It
	    is  a  software  program which,  once installed,  is completely
	    transparent to the entire system's  operation.    There  is  no
	    additional  hardware  to  fail  since  none  is  needed for its
	    operation.   It will control and track many thousands of  users
	    and  as many dial-up lines as the system will allow.   Standard
	    with every SENTINEL are various modes of operation which  cover
	    varying needs and levels of security.

	    Following are some of the major features of THE SENTINEL:

	       1. FIXED _CALL-BACK:        When someone calls the protected
		  dial-up line(s) THE  SENTINEL  answers.    An  authorized
		  caller  enters  the appropriate access password for their
		  particular line and then hangs up.    THE  SENTINEL  then
		  calls back only to the location assigned to that password
		  code.    The  same line is used for both the incoming and
		  outgoing calls.

	       2. TERMINAL _SECURITY:    All  stations  and  terminals  are
		  protected  against  unauthorized  use.    Specific access
		  codes are set  for  specific  users  and/or  assigned  to
		  specific   sensitive   terminals.      Access   for   all
		  unauthorized users is therefore denied.

	       3. AUDIT TRAIL:  The Audit Trail provides a one-line  record
		  describing  each  call  attempt registered by the system.
		  It indicates the time and date a call was  received,  the
		  incoming and outgoing lines that were used, the caller ID
		  and a status code for each call: i.e. call complete, line
		  busy, access denied.  In addition, it records any changes
		  made  to  the  system's  directory or changes made by the
		  system manager.

	       4. TIME-ACCESS CONTROL:  System access can be controlled  at
		  specified times throughout the day,  or access can remain
		  unlimited.   Access passwords can be varied for different
		  times  of  the  day  and/or  eliminated  at  other times.
		  Therefore,  access can even be denied to authorized users
		  at certain periods of the day.  Through the use of access
		  passwords,  you can control allowable login days, maximum
		  time of system use,  and also the latest time that a user
		  can login to the system.

	       5. GROUP PROTECTION:   The Group Protection security feature
		  applies  all  of  THE SENTINEL's  security features to an
		  entire login group.

	       6. INTEGRITY PROTECTION: Once the system has been activated,
		  a `watchdog'  section  is  provided  which  prevents  and
		  detects  any  unauthorized  changes  to the files.   This
		  insures  that  the  integrity  of  the   system   remains
		  inviolate  at  all  times  and  that no one can access or
		  change any secured area of the system without authority.

	       7. HARDWARE _REQUIREMENT:        THE   SENTINEL   completely
		  eliminates   any   hardware  need  for  space  and  power
		  allocations.   There is absolutely no additional hardware
		  required  for  the  use of the SENTINEL.   It is software
		  only,   eliminating  all  space  and  power  requirements
		  usually needed by other security systems.

	    While  THE SENTINEL represents a whole new approach to system access
	    control,  there is nothing new  about  the  ISPI  approach  to  high
	    quality products and service.   A major advantage of THE SENTINEL is
	    that existing hardware or software does not have to  be  changed  or
	    replaced.    It  works  in conjunction with your existing XENIX/UNIX
	    operating system and operates with all standard modems at any  speed
	    or protocol.

		  For a very limited time only,  we offer a special introductory
	    price of $250  to $350 depending upon the operating system  and  the
	    number  of communication lines.   For more information contact:  SAM
	    BAYER,  DEPT.  S-1,  ISPI,  19 VIRGINIA AVE.,  ROCKVILLE CENTRE,  NY
	    11570,  TEL: (516)-766-2867.



- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
FACT SHEET
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -


	     The following check-off list compares the SENTINEL to another
	     well-known hardware system selling for $9,000 for an 18 line
	     central office system and 500 user listings.



				   COMPARISON TABLE



						SENTINEL	COMPETITIVE
								HARDWARE
								SYSTEM

	     Automatic call-back		Yes		Yes

	     Modem answer tone at host		Yes		Yes

	     Separate ID & Password per user 	Yes		Yes

	     Alpha-numeric ID's & Passwords	Yes		Yes

	     User ID required after callback	Yes		Yes

	     Full terminal communications	Yes		Yes
		  at all times
	
	     Full use of modems & software	Yes		Yes
		  at remote PC's

	     Users must learn new procedures	No		No

	     Number of concurrent callbacks	No		No
		  limited

	     Host originated calls allowed	Yes		Yes

	     No-data-activity time-out		Yes		Yes

	     Extra non-data lines required	No		No

	     All lines & host ports operate	Yes		Yes
		  at multiple data rates

	     Additional modems, lines & host	No		No
		  ports required at each
		  speed




						SENTINEL	COMPETITIVE
								HARDWARE
								SYSTEM

	     Additional equipment required	No		Yes
		  at either host system or
		  terminal

	     Limited number of users		No		Yes

	     Maximum number of telephone	No		Yes
		  lines

	     Log file and report of all		Yes		Yes
		  authorized/unauthorized
		  access attempts

	     System access via any serial	Yes		No
		  port can be restricted
		  by time-of day, day-of-week,
		  time-on-system, and port-of-
		  use.

	     Passwords can be assigned to	Yes		Yes
		  each serial port

	     On-screen Help messages		Yes		No

	     Time of use restriction		Yes		No

	     Transparent to user		Yes		No

	     Cost				Under           Excess of
						$500.		$9000.