Kace Networks KBox 1100 review

Kace aims to deliver a complete desktop and asset management solution in a box. In this review we put that claim to the test and find out more about its unique application virtualisation option.

The KBox scores well with its inventory accuracy. We had a wide selection of systems on the test network ranging from old Pentium 4 workstations right up to systems endowed with AMD Opteron Shanghai' and Intel Series 5500 Xeon processors and Kace picked them all up correctly.

Selecting a computer from the list displays its innermost secrets so you can view all hardware, printers, software applications, installed updates, running processes and much more. For identified software you can view all applications and selecting one will reveal which systems it is installed on.

Kace3

Kace's hardware inventory was on the money and picked up all our Windows 7 systems.

For patch management Kace has teamed up with Lumension and uses its PatchLink service for Windows and Macintosh systems. Unix and Linux system support is in the pipeline and Kace advised us that it's still waiting for Lumension to provide the relevant APIs. Kace has an SLA with Lumension to ensure that all patches are tested and verified by it before being passed on to the appliance.

The optional help desk service enables users to submit trouble tickets via email or the Service Centre web portal. The appliance offers a good range of features as administrators can view all tickets, see their status, assign them to users and change their priorities.

Kace4

Kontainers are created using a program install file and then exported to selected host systems.

Once a user has raised a support ticket it can be assigned to specific support staff or groups and automatic escalation rules are applied. If a ticket passes its due date of completion it is classed as stalled. The appliance then starts sending out email alerts until its status or priority is updated and it can also change ownership to a new user.

Kace's Kontainers look very interesting as these are designed to present virtual applications to selected systems. A key focus with Kontainers is they enable clients to run applications in a safely isolated environment where all access can be strictly managed.

Featured Resources

Four cyber security essentials that your board of directors wants to know

The insights to help you deliver what they need

Download now

Data: A resource much too valuable to leave unprotected

Protect your data to protect your company

Download now

Improving cyber security for remote working

13 recommendations for security from any location

Download now

Why CEOS should care about the move to SAP S/4HANA

And how they can accelerate business value

Download now

Most Popular

80% of cyber professionals say the Computer Misuse Act is working against them
Security

80% of cyber professionals say the Computer Misuse Act is working against them

20 Nov 2020
Cisco acquires container security startup Banzai Cloud
Security

Cisco acquires container security startup Banzai Cloud

18 Nov 2020
350,000 Spotify users hacked in credential stuffing attack
Security

350,000 Spotify users hacked in credential stuffing attack

24 Nov 2020