jbayer@ispi.UUCP (id for use with uunet/usenet) (09/08/88)
The following press release was sent out on July 11, 1988: NEW PRODUCT INFORMATION FOR IMMEDIATE RELEASE SUBJECT: `THE SENTINEL'... CONTACT: SAM BAYER, PRES. SECURITY SOFTWARE TEL. #: (516) 766-2867 FOR XENIX/UNIX OPERATING SYSTEM DATE: JULY 11, 1988 MAJOR BREAKTHROUGH REDUCES SECURITY SYSTEM COSTS FOR XENIX/UNIX!! Intelligent Software Products, Inc. is pleased to announce the availability of THE SENTINEL for the XENIX/UNIX operating system. THE SENTINEL, our exclusive new security software system, now provides complete, reasonable and attainable security for XENIX/UNIX, previously only available in the $2,000-$20,000 RANGE. THE SENTINEL is an advanced, menu- driven, data communication security system which completely protects the computer from any unauthorized entry. It totally secures all the communication lines allowed by the operating system. It also limits users to specified terminals so access will be denied to unauthorized users. Features include: multiple passwords per user, callback telephone numbers (for modem users), controlled access times, allowable terminals and various log files. Throughout the entire process THE SENTINEL is transparent to the operating system. DESCRIPTION THE SENTINEL controls all access to dial-up data networks. It is a software program which, once installed, is completely transparent to the entire system's operation. There is no additional hardware to fail since none is needed for its operation. It will control and track many thousands of users and as many dial-up lines as the system will allow. Standard with every SENTINEL are various modes of operation which cover varying needs and levels of security. Following are some of the major features of THE SENTINEL: 1. FIXED _CALL-BACK: When someone calls the protected dial-up line(s) THE SENTINEL answers. An authorized caller enters the appropriate access password for their particular line and then hangs up. THE SENTINEL then calls back only to the location assigned to that password code. The same line is used for both the incoming and outgoing calls. 2. TERMINAL _SECURITY: All stations and terminals are protected against unauthorized use. Specific access codes are set for specific users and/or assigned to specific sensitive terminals. Access for all unauthorized users is therefore denied. 3. AUDIT TRAIL: The Audit Trail provides a one-line record describing each call attempt registered by the system. It indicates the time and date a call was received, the incoming and outgoing lines that were used, the caller ID and a status code for each call: i.e. call complete, line busy, access denied. In addition, it records any changes made to the system's directory or changes made by the system manager. 4. TIME-ACCESS CONTROL: System access can be controlled at specified times throughout the day, or access can remain unlimited. Access passwords can be varied for different times of the day and/or eliminated at other times. Therefore, access can even be denied to authorized users at certain periods of the day. Through the use of access passwords, you can control allowable login days, maximum time of system use, and also the latest time that a user can login to the system. 5. GROUP PROTECTION: The Group Protection security feature applies all of THE SENTINEL's security features to an entire login group. 6. INTEGRITY PROTECTION: Once the system has been activated, a `watchdog' section is provided which prevents and detects any unauthorized changes to the files. This insures that the integrity of the system remains inviolate at all times and that no one can access or change any secured area of the system without authority. 7. HARDWARE _REQUIREMENT: THE SENTINEL completely eliminates any hardware need for space and power allocations. There is absolutely no additional hardware required for the use of the SENTINEL. It is software only, eliminating all space and power requirements usually needed by other security systems. While THE SENTINEL represents a whole new approach to system access control, there is nothing new about the ISPI approach to high quality products and service. A major advantage of THE SENTINEL is that existing hardware or software does not have to be changed or replaced. It works in conjunction with your existing XENIX/UNIX operating system and operates with all standard modems at any speed or protocol. For a very limited time only, we offer a special introductory price of $250 to $350 depending upon the operating system and the number of communication lines. For more information contact: SAM BAYER, DEPT. S-1, ISPI, 19 VIRGINIA AVE., ROCKVILLE CENTRE, NY 11570, TEL: (516)-766-2867. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - FACT SHEET - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - The following check-off list compares the SENTINEL to another well-known hardware system selling for $9,000 for an 18 line central office system and 500 user listings. COMPARISON TABLE SENTINEL COMPETITIVE HARDWARE SYSTEM Automatic call-back Yes Yes Modem answer tone at host Yes Yes Separate ID & Password per user Yes Yes Alpha-numeric ID's & Passwords Yes Yes User ID required after callback Yes Yes Full terminal communications Yes Yes at all times Full use of modems & software Yes Yes at remote PC's Users must learn new procedures No No Number of concurrent callbacks No No limited Host originated calls allowed Yes Yes No-data-activity time-out Yes Yes Extra non-data lines required No No All lines & host ports operate Yes Yes at multiple data rates Additional modems, lines & host No No ports required at each speed SENTINEL COMPETITIVE HARDWARE SYSTEM Additional equipment required No Yes at either host system or terminal Limited number of users No Yes Maximum number of telephone No Yes lines Log file and report of all Yes Yes authorized/unauthorized access attempts System access via any serial Yes No port can be restricted by time-of day, day-of-week, time-on-system, and port-of- use. Passwords can be assigned to Yes Yes each serial port On-screen Help messages Yes No Time of use restriction Yes No Transparent to user Yes No Cost Under Excess of $500. $9000.