SCOUG OS/2 For You - July 1994
 
The Secure Workplace - For Desktop Security
by Richard Frank   
 Have you ever wanted to take your computer to a Team OS/2 demo but were 
afraid that your carefully crafted desktop would be destroyed?  Do you get 
tired of loading programs on a store machine that you know will be 
inoperable the next day?  Ever fumble for  the location of an item using 
someone elses system? Enter "The Secure Workplace."   
 The Secure Workplace is a desktop security program from Syntegration. 
While other programs perform similar functions, none that I have seen 
match the price/performance and Workplace Shell integration achieved here. 
Whether you want to secure your deskto during a demo,  prevent your 
children from getting into desktop trouble, stop a beginner from trashing 
their own setup, make a store machine tamper proof or setup a large secure 
LAN, The Secure Workplace has something for you.   
 Installation is easy, although the installation program is not as polished 
as the rest of the user interface. After you tell the program where to 
find OS/2, the installation informs you as it adds functions.  Once 
complete, your system is ready for action.   
 Special Templates Provide Security   
 You start with the addition of several templates to your templates folder 
that give you Secure Programs, Secure Folders, Restricted Folders and 
Password Folders.  You use these new secure templates the same way that 
you would any other templates with the addition of separate pages for 
setting local and global passwords and the details of how secure you want 
your setup to be.  By checking boxes, you decide whether you want to be 
able to copy, move, shadow, delete, rename, drag, select, sort, arrange or 
get the details view of an object.  This makes it extremely easy to 
protect your desktop with a minimum of fuss using a very intuitive user 
interface.   
 The Secure Program template allows creation of a program object that you 
can use without restriction, but most menu options are removed and 
optionally the settings are password protected.  This function could be 
used to lock an icon in place and prevent accidental deletion, sorting, 
etc. without removing the ease of using that program object.  Great for 
new users, or for tech support.  Since you can lock an item in place, 
remote tech support personnel can direct a user to the exact location of 
an object without fear that the object has been moved or destroyed.  This 
also prevents "adventurous" new users from making an irrecoverable error 
before they learn the ropes.   
 The Restricted Folder works the same way as the Secure Program but with a 
folder instead of an individual program.  Again, this can be used to 
protect a folder that contains programs shared among users.  A note of 
caution is needed here, however.  Creating a Restricted Folder and 
dropping program objects into it does not make the objects secure.  You 
must use the Secure Program template to do that.   
 
 
The Password Folder goes one step further in protecting your programs. As 
the name suggests, it password locks the folder so that unauthorized 
personnel cannot open it.  In addition, it optionally has a different 
password for unlocking the settings of th folder.  It shares the features 
of the Secure Folder. The Password Folder could be used to limit entry to 
critical program objects to knowledgeable people while keeping newer users 
away from the heart of OS/2.   
 The Secure Folder is not really meant for an end user.  Everything from 
opening the folder to adjusting any setting to opening a program is 
password controlled. This would generally be used for very sensitive data 
or those few very vital objects that the user would not need to deal with. 
  
 Now on to the other utilities provided with The Secure Workplace.   
 The Window List Manager is another tool to prevent the end user from 
making an end run around your security protection.  With it, you can make 
a window list entry invisible, or grayed out, along with making the 
program "non-jumpable."  This means that when you cycle through the open 
programs using <alt> - <esc>, a non-jumpable program will be skipped. 
 This is very useful in a LAN environment when you want the server window 
to be transparent to the user.  You can use this utility from the command 
line, or interactively through a PM object.   
 The Object-Maker is a script file that allows you to make custom objects. 
 While an end user may find this tedious, a LAN manager would be able to 
use this to update or restore all of the systems under his control with 
one script, saving a great deal of time per system.  The Secure Workplace 
comes with sample files to get you started.   
 The Object Relocator uses a REXX script to move existing program objects 
to new locations, again allowing for easy and uniform customization of a 
series of desktops.   
 What's in the near future for desktop security?  Well, how about a Log-On 
Folder that would allow for remote log-on to a LAN and then create that 
user's particular custom folder on the machine they are using at the time. 
 The folder is destroyed upon log-off, allowing a user to go anywhere and 
still have their familiar setup waiting for them. Can't you see the 
 opportunities here?   
 In Conclusion   
 The Secure Workplace allows the end user to decide how much security is 
needed on a particular system. It allows tech support to rely on programs 
and documentation being where they should be.  It provides the new user 
with a reliable, consistent desktop. For a suggested retail price of 
$59.95, The Secure Workplace is cheap insurance for your system.   
 The Secure Workplace is available in both a single user version ($59.95) 
and a broader enterprise edition ($549 for a 10 workstation license).  For 
more information about this product, contact Syntegration, 13241 Norton 
Avenue, Chino, CA 91710; phone(909) 464-9450; FAX (909) 464-9438. It can 
be found at Indelible Blue, Inc., (800) 776-8284; The Corner Store, (800) 
I-BUY-OS2; and locally at Office Solutions, (800) 897-APPS or (310) 
439-5567.   
  
  
The Southern California OS/2 User Group
 P.O. Box 26904
 Santa Ana, CA  92799-6904, USA
Copyright 1994 the Southern California OS/2 User Group.  ALL RIGHTS
RESERVED. 
 SCOUG is a trademark of the Southern California OS/2 User Group.
 OS/2, Workplace Shell, and IBM are registered trademarks of International 
Business Machines Corporation.
 All other trademarks remain the property of their respective owners.
 
       
 |