Neon Software LANsurveyor 9.5

Simple to install, but once up and running it's extremely easy to use

Price
£468
  • Clean user interface, support for CDP and LLDP discovery protocols
  • Responders only available for Windows or OS X machines

After Novell's super-comprehensive Zenworks package with its multiple modules and many CDs, Lansurveyor 9.5 - on a single CD - comes as a breath of fresh air.

Not only is it simple to install, but once up and running it's extremely easy to use and we had mapped out our test network within minutes of the product asking us which segment we wanted to scan. The software does this via Ping, Netbios and SNMP requests.

This latest version of the product boasts support for CDP and LLDP Discovery Protocols (Cisco Discovery Protocol and Link Layer Discovery Protocol) as well as Microsoft Baseline Security Analyzer 2.0 .

The product is organised into three components or modules. The first and principal constituent is the main console, which gives an overview of how devices and nodes on the network infrastructure are mapped out. Once we had scanned our test system we were able to drill down on specific parts of the network and unearth information on each node. The network map can by saved as a Visio or JPEG file as well.

The second module is the so-called Neon Responder - an optional component, installed on the systems that need to be monitored, that draws detailed information on a device's hardware and software and records it to a Microsoft SQL Server or MSDE database. This remote deployment tool has to be installed onto Windows or Mac OS X client machines in order to unearth this information about the computer.

The third component, Continuous Scan, acts as an intrusion detection system. Using the baseline map of the network it scans for changes on the network (surprise, surprise) on a continuous basis. This means that rogue devices, such as wireless access points installed by users, can be barred from connection to the network until they are placed on a white list and allowed access. This is achieved in conjunction with managed switches on the network and is a reasonably cheap way for small companies to include endpoint security within their infrastructure.

In addition to all of the above there's also a polling feature thrown in. This will scan critical ports on target machines and alert the administrator when an application stops responding (such as a web, mail or DNS server). We tested it by setting it to monitor a remote server which we set to go offline after five minutes. As expected the product duly notified us that the remote server could no longer be contacted.

Verdict

Featured Resources

The ultimate law enforcement agency guide to going mobile

Best practices for implementing a mobile device program

Free download

The business value of Red Hat OpenShift

Platform cost savings, ROI, and the challenges and opportunities of Red Hat OpenShift

Free download

Managing security and risk across the IT supply chain: A practical approach

Best practices for IT supply chain security

Free download

Digital remote monitoring and dispatch services’ impact on edge computing and data centres

Seven trends redefining remote monitoring and field service dispatch service requirements

Free download

Most Popular

Best Linux distros 2021
operating systems

Best Linux distros 2021

11 Oct 2021
Windows 11 has problems with Oracle VirtualBox
Microsoft Windows

Windows 11 has problems with Oracle VirtualBox

5 Oct 2021
What is cyber warfare?
Security

What is cyber warfare?

15 Oct 2021