Solved

Cisco Network Magic - is it "safe?"

Posted on 2009-07-06
3
357 Views
Last Modified: 2012-05-07
I read a review in PCMag of Cisco Network Magic Pro 5.5, and it got a glowing review. It sounds like this product could help me.

However, since network monitoring has the potential for misbehaving, I was wondering if there are any reports of anything "bad" in this product. I would assume that Cisco's reputation should cause this product to be squeaky-clean, but still wondering.

Any bad news out there?
0
Comment
Question by:jasimon9
  • 2
3 Comments
 
LVL 8

Accepted Solution

by:
engeltje earned 500 total points
ID: 24859824
Cisco Network Magic is nothing else than a wizard based network setup tool.
It will be allways safer to follow this wizards.
When you de the setup yourself, things are as secure as your knowledge of security.
This software does setup the networking and security for you.
As you said, Cisco cannot afford to have leaks in this product. It would kill their reputation.
0
 

Author Comment

by:jasimon9
ID: 24864409
You say "nothing more than ...."

I suppose that your comment might apply to part of this product. However, there is much more. For example, there is quite a bit of network monitoring and reporting. I have installed it on one of my systems, and it offers the feature of monitoring all the network activity on a program by program basis, collecting this data centrally, and allowing me to view it as a web page.

The network map function is pretty nifty to.

Both of these functions go beyond the "wizard" aspect IMHO.

Nevertheless, you comment is valuable. My concern is still that lots of data about my systems is sent out over the Internet, and I am wondering what security is provided for that information. I read the Cisco privacy policy, and it seems to cover the ground.

In addition, some searching did not find any complaints. This of course proves nothing. But if there were complaints, that would prove something -- but there are not.
0
 

Author Closing Comment

by:jasimon9
ID: 31600324
Since no further input has come in, points awarded.
0

Featured Post

Threat Intelligence Starter Resources

Integrating threat intelligence can be challenging, and not all companies are ready. These resources can help you build awareness and prepare for defense.

Join & Write a Comment

Network ports are the threads that hold network communication together. They are an essential part of networking that can be easily ignore or misunderstood, my goals is to show those who don't have a strong network foundation how network ports opera…
Today, still in the boom of Apple, PC's and products, nearly 50% of the computer users use Windows as graphical operating systems. If you are among those users who love windows, but are grappling to keep the system's hard drive optimized, then you s…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

706 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now