PCWTCHDG.RVW 930907 Comparison Review Company and product: Fischer International Systems Corporation P. O. Box 9107 4073 Merchantile Avenue Naples, Florida 33942 813-643-1500 800-237-4510 Watchdog 7 carol.smykowski@emc2-tao.fisc.com Summary: Operation restriction, change detection and encryption software Cost Rating (1-4, 1 = poor, 4 = very good) "Friendliness" Installation 3 Ease of use 3 Help systems 2 Compatibility 3 Company Stability 3 Support 3 Documentation 3 Hardware required 4 Performance 3 Availability 2 Local Support 2 General Description: Watchdog is a general security product for a PC and therefore it is difficult to compare it with the bulk of virus security products. Please note in the following that this is one of the few products providing general security for the PC, and therefore the comments regarding some of the difficulty of use apply only to those who are looking strictly for virus protection. Those wishing to compare it to other overall security products should compare it with SAFE (cf PCSAFE.RVW) and DISKSECURE (cf PCDSKSEC.RVW). (Please note that the other generic security package, Advanced Security (cf PCADVGRV.RVW), is no longer supported.) Between versions 6 and 7, extensive efforts were made to provide ease of use and improved explanations fo the operation of the program. Watchdog now enjoys a fairly clear advantage over other general PC security programs. Comparison of features and specifications User Friendliness Installation Since Watchdog is primarily concerned with access and operation restriction, the longest part of the installation is going to be the decisions you make regarding access. The "Installation Guide" says that you need to answer some questions, and that preparing your answers ahead of time will speed the installation process. Superb understatement. What you are essentially doing is adding the multi-user security access of a mainframe, mini computer or LAN to MS-DOS. Therefore, expect to dedicate the same time and attention to the installation that you would give to the system administration of a similarly sized mini computer. Indeed, one of the first steps in installation is to set up a "System Administrator" account. (If you are the only person to be using the micro, that's you.) You will also have to set up any "user" accounts. For each user, you will have to determine on a device (printer, serial port, floppy drive), directory and sometimes even file-by-file basis, whether or not this user has access to the entity, and which type of access. Much of this may be the same from user to user, but the initial planning will take considerable thought. For example, you may grant a certain user access to all the DOS programs and files so that they can use the utilities. But, if they are only running the utilities, they will not need "write" access to the DOS directory, right? Well, if they don't have write access, they can't use SETVER, since it writes to itself each time it is used with a new program. The new documentation does address some of these issues, and suggests special attention for the more commonly used programs such as Word Perfect and Lotus 1-2-3. For the program and package to be at all effective you must plan the access controls very thoroughly, and very carefully. It is *not* going to be enough to read "Getting Started". Since version 6, however, the installation process has been considerably improved, as has the documentation. I would strongly recommend that *all* installers read the "Concepts Guide". This manual is reasonably short, and should not be an onerous task. The installation manuals see "installation" as being merely the copying of the program onto the hard disk. The actual protection seems to be seen as "management". In this case, however, the job isn't finished until the administration is done. The process has been improved with the new installation and setup procedure. Watchdog now allows "transparent access" to unrestricted areas, so by default you could leave the system unprotected after installation and do your administration at a later date. The setup program also now shows you which areas are unprotected, and therefore prompts you for more complete protection. Ease of use Once the decisions regarding access and control have been made, the actual implementation is quite straightforward. (However, recall that, as with the SETVER example, the terminology regarding the setting of permission and access may sometimes be open to interpretation.) Users should have no problems with a properly set up system unless confronted with unusual new "error" messages. In many cases Watchdog may aid in ease of use of the computer through the menuing access system. Again, remember that you are adding multi-user controls to what was formerly a "personal" computer. The additional security of this system comes at a cost of additional administration and "support". Help systems On screen help is provided on most screens and menus in Watchdog. Note that this is only help on the operation of the program: ultimately the safety of the system rests with you. Compatibility Depending upon installation, there may be problems with programs which rewrite their own code, or into "system" directories. Version 7 has made provisions for the operation of Windows as well as multi-tasking and memory management utilities. Company Stability Fischer is well established in the security field, and has a good reputation in mainframe security. Company Support My experience with the company on other occasions has been very favorable. This program has now been reviewed twice. Fischer responded to my first review, and shipped the updated version 7, which addressed many of the criticisms I had of version 6. Note that, although I make every effort to provide an opportunity for a response from vendors, commercial software houses have been singularly lacking in responding, and so the response itself is a point in Fischer's favour. Documentation Watchdog now comes with eight manuals. Daunting, perhaps, for the neophyte, but it actually reduces the amount of material you have to read. Only one, the "SA Program Guide" is of any great size. "Getting Started", "Setup Guide" and "Quick Reference" are obviously intended, and generally rightly so, to be the heart of the documentation. "Concepts Guide", "Advanced Topics", "SA Program Guide", "Producing Reports" and "User Guide" are relegated to a secondary role. I would, however, suggest that the "Concepts Guide" be given prominence. It is not long, and gives a clear picture of what Watchdog *can* do in the way of security. I would still suggest a general security handbook, although the "Concepts Guide" does cover many of the basics. Hardware Requirements This system is intended to protect data on the hard drive. It may also manage device access. Performance Ultimately, Watchdog is far more, and somewhat less, than an antiviral protection package. The necessary administration of the system may not be worth the benefit if virus protection is the only concern. The operation, restriction, and particularly the boot protection, of Watchdog can provide protection against the most common of current viral infections. However, that software operation restriction does have an "Achilles heel": what software can do, software can undo. If using Watchdog for virus protection, check the change detection audit frequently. The reports and audits, in fact, are a major strength fo Watchdog. SAs should take advantage of the resource. Fischer also produces a hardware security card, Watchdog Armor, which works in conjunction with Watchdog. This was not provided for review. Local Support The company has an 800 number (which even works from Canada) and Internet access. Support Requirements For those used to a PC environment the support requirements will be quite high. Those familiar with security on other platforms will find it much the same. copyright Robert M. Slade, 1993 PCWTCHDG.RVW 930907 ====================== roberts@decus.ca rslade@vcn.bc.ca rslade@vanisl.decus.ca I do not feel obliged to believe that the same God who has endowed us with sense, reason and intellect has intended us to forgo their use - Galileo Author "Robert Slade's Guide to Computer Viruses" 0-387-94663-2 (800-SPRINGER)