PCWTCHDG.RVW   930907
 
                               Comparison Review
 
Company and product:
 
Fischer International Systems Corporation
P. O. Box 9107
4073 Merchantile Avenue
Naples, Florida 33942
813-643-1500
800-237-4510
Watchdog 7
carol.smykowski@emc2-tao.fisc.com
 
Summary: Operation restriction, change detection and encryption software
                              
 
Cost                          
 
Rating (1-4, 1 = poor, 4 = very good)
      "Friendliness"
            Installation      3
            Ease of use       3
            Help systems      2
      Compatibility           3
      Company
            Stability         3
            Support           3
      Documentation           3
      Hardware required       4
      Performance             3
      Availability            2
      Local Support           2
 
General Description:
 
Watchdog is a general security product for a PC and therefore it is difficult
to compare it with the bulk of virus security products.  Please note in the
following that this is one of the few products providing general security for
the PC, and therefore the comments regarding some of the difficulty of use
apply only to those who are looking strictly for virus protection.  Those
wishing to compare it to other overall security products should compare it with
SAFE (cf PCSAFE.RVW) and DISKSECURE (cf PCDSKSEC.RVW).  (Please note that the
other generic security package, Advanced Security (cf PCADVGRV.RVW), is no
longer supported.)
 
Between versions 6 and 7, extensive efforts were made to provide ease of use
and improved explanations fo the operation of the program.  Watchdog now enjoys
a fairly clear advantage over other general PC security programs.
                  Comparison of features and specifications
 
 
 
User Friendliness
 
Installation
 
Since Watchdog is primarily concerned with access and operation restriction,
the longest part of the installation is going to be the decisions you make
regarding access.  The "Installation Guide" says that you need to answer some
questions, and that preparing your answers ahead of time will speed the
installation process.  Superb understatement.  What you are essentially doing
is adding the multi-user security access of a mainframe, mini computer or LAN 
to MS-DOS.   Therefore, expect to dedicate the same time and attention to the
installation that you would give to the system administration of a similarly
sized mini computer.  Indeed, one of the first steps in installation is to set
up a "System Administrator" account.  (If you are the only person to be using
the micro, that's you.)  You will also have to set up any "user" accounts.
 
For each user, you will have to determine on a device (printer, serial port,
floppy drive), directory and sometimes even file-by-file basis, whether or not
this user has access to the entity, and which type of access.  Much of this may
be the same from user to user, but the initial planning will take considerable
thought.  For example, you may grant a certain user access to all the DOS
programs and files so that they can use the utilities.  But, if they are only
running the utilities, they will not need "write" access to the DOS directory,
right?  Well, if they don't have write access, they can't use SETVER, since it
writes to itself each time it is used with a new program.  The new
documentation does address some of these issues, and suggests special attention
for the more commonly used programs such as Word Perfect and Lotus 1-2-3.
 
For the program and package to be at all effective you must plan the access
controls very thoroughly, and very carefully.  It is *not* going to be enough
to read "Getting Started".  Since version 6, however, the installation process
has been considerably improved, as has the documentation.  I would strongly
recommend that *all* installers read the "Concepts Guide".  This manual is
reasonably short, and should not be an onerous task.
 
The installation manuals see "installation" as being merely the copying of the
program onto the hard disk.  The actual protection seems to be seen as
"management".  In this case, however, the job isn't finished until the
administration is done.  The process has been improved with the new
installation and setup procedure.  Watchdog now allows "transparent access" to
unrestricted areas, so by default you could leave the system unprotected after
installation and do your administration at a later date.  The setup program
also now shows you which areas are unprotected, and therefore prompts you for
more complete protection.
 
Ease of use
 
Once the decisions regarding access and control have been made, the actual
implementation is quite straightforward.  (However, recall that, as with the
SETVER example, the terminology regarding the setting of permission and access
may sometimes be open to interpretation.)  Users should have no problems with a
properly set up system unless confronted with unusual new "error" messages.  In
many cases Watchdog may aid in ease of use of the computer through the menuing
access system.
 
Again, remember that you are adding multi-user controls to what was formerly a
"personal" computer.  The additional security of this system comes at a cost of
additional administration and "support".
 
Help systems
 
On screen help is provided on most screens and menus in Watchdog.  Note that
this is only help on the operation of the program:  ultimately the safety of
the system rests with you.
 
Compatibility
 
Depending upon installation, there may be problems with programs which rewrite
their own code, or into "system" directories.  Version 7 has made provisions
for the operation of Windows as well as multi-tasking and memory management
utilities.
 
Company Stability
 
Fischer is well established in the security field, and has a good reputation in
mainframe security.
 
Company Support
 
My experience with the company on other occasions has been very favorable. 
This program has now been reviewed twice.  Fischer responded to my first
review, and shipped the updated version 7, which addressed many of the
criticisms I had of version 6.  Note that, although I make every effort to
provide an opportunity for a response from vendors, commercial software houses
have been singularly lacking in responding, and so the response itself is a
point in Fischer's favour.
 
Documentation
 
Watchdog now comes with eight manuals.  Daunting, perhaps, for the neophyte,
but it actually reduces the amount of material you have to read.  Only one, the
"SA Program Guide" is of any great size.  "Getting Started", "Setup Guide" and
"Quick Reference" are obviously intended, and generally rightly so, to be the
heart of the documentation.  "Concepts Guide", "Advanced Topics", "SA Program
Guide", "Producing Reports" and "User Guide" are relegated to a secondary role. 
I would, however, suggest that the "Concepts Guide" be given prominence.  It is
not long, and gives a clear picture of what Watchdog *can* do in the way of
security.
 
I would still suggest a general security handbook, although the "Concepts
Guide" does cover many of the basics.
 
Hardware Requirements
 
This system is intended to protect data on the hard drive.  It may also manage
device access.
 
Performance
 
Ultimately, Watchdog is far more, and somewhat less, than an antiviral
protection package.  The necessary administration of the system may not be
worth the benefit if virus protection is the only concern.  The operation,
restriction, and particularly the boot protection, of Watchdog can provide
protection against the most common of current viral infections.  However, that
software operation restriction does have an "Achilles heel":  what software can
do, software can undo.  If using Watchdog for virus protection, check the
change detection audit frequently.  The reports and audits, in fact, are a
major strength fo Watchdog.  SAs should take advantage of the resource.
 
Fischer also produces a hardware security card, Watchdog Armor, which works in
conjunction with Watchdog.  This was not provided for review.
 
Local Support
 
The company has an 800 number (which even works from Canada) and Internet
access.
 
Support Requirements
 
For those used to a PC environment the support requirements will be quite high. 
Those familiar with security on other platforms will find it much the same.
 
copyright Robert M. Slade, 1993   PCWTCHDG.RVW   930907

======================
roberts@decus.ca           rslade@vcn.bc.ca           rslade@vanisl.decus.ca
  I do not feel obliged to believe that the same God who has endowed us with
   sense, reason and intellect has intended us to forgo their use - Galileo
Author "Robert Slade's Guide to Computer Viruses" 0-387-94663-2 (800-SPRINGER)