NAC product.docx

上传人:b****5 文档编号:6239166 上传时间:2023-01-04 格式:DOCX 页数:21 大小:28.51KB
下载 相关 举报
NAC product.docx_第1页
第1页 / 共21页
NAC product.docx_第2页
第2页 / 共21页
NAC product.docx_第3页
第3页 / 共21页
NAC product.docx_第4页
第4页 / 共21页
NAC product.docx_第5页
第5页 / 共21页
点击查看更多>>
下载资源
资源描述

NAC product.docx

《NAC product.docx》由会员分享,可在线阅读,更多相关《NAC product.docx(21页珍藏版)》请在冰豆网上搜索。

NAC product.docx

NACproduct

Product

Vendor

Discription

Veri-NAC™

BlackBoxCorporation

Veri-NAC™isafamilyofNetworkAccessControl(NAC)appliancesfromBlackBoxthatensuresthatonlyauthorizeddevicesandusersgainaccesstoyournetwork.Italsoscreensforvulnerabilitiesincomputersconnectedtoyournetwork,returningmobileusers,wirelessdevices,andnewdevices.IfVeri-NACdetectsanuntrustedasset,itrespondsinstantlytoshutoffnetworkaccessforthatdevice—protectingyournetworkwhilekeepingyourtrusteddevicessecurelyon-line.*Controlwhocanconnecttoyournetwork.Unknownlaptopsandunauthorizedwirelessaccesspointsarenolongeraproblem.*Protectyournetwork—findandfixholesbeforethey’reexploited.*Detectmalwareandquarantineuntrustedassets.*ManageIPswithActiveDirector.*ComplywithrequirementsforGLBA,HIPAA,PCI,ISO27001,andothersecurityandprivacystandards.

TrustwavePlug-and-PlayNetworkAccessControl

Trustwave

Forsmallerorganizationsthatneedthefastestpathtosecuringthenetwork,Trustwaveoffersaplug-and-playNetworkAccessControloption.Thissolutionconsistsofasingle,simple-to-deployappliancethatperformsfull-cycleNAC.Theriskprofileofeveryconnectedendpointisimmediatelyavailableoncetheapplianceispluggedintoanetworkswitchandgivenbasicconfigurationviaanintuitiveinterface.Nonetworkredesignorintegrationisrequired.

TrustwaveManagedNetworkAccessControl

Trustwave

Trustwave'sManagedNetworkAccessControlprovidesfull-featureNACasamanagedsecurityservicewithproactivemanagement,maintenance,andmonitoring.ManagedNAChelpscustomersdecreasetheinternalresourcesneededtofullybenefitfromrobustaNetworkAccessControlsolution.

TrustwaveEnterpriseNetworkAccessControl

Trustwave

Trustwave'ssuiteofintegratedappliancesisascalablefull-cycleNetworkAccessControlsolutiondesignedtoprotectlargeenterprisenetworks.Trustwaveoffersfullprotectionforallendpoints,managedandunmanaged,andworksinanynetworkinfrastructure.Oursolutionscombineagent-lessnetworkaccesscontrolwithzero-daythreatpreventionandautomatedpolicyenforcement.Networkintelligenceprovidesaunifiedviewofendpointactivityanddeliverspowerfulanalysisofyournetwork'shistoryandusage.Together,thesefeaturesdelivercomprehensiveendpointcontrol,offeringsecuritychecksthroughoutthelifecycleofadevice'snetworkaccess.TrustwavemanagementserversdelivercentralizedmanagementandmonitoringofNetworkAccessControlappliancesdeployedthroughoutyourenterprise.Alldevicesandpoliciesaremanagedfromacentralmanagementconsoles.

SymantecNetworkAccessControlStarterEdition

SymantecCorporation

SymantecNetworkAccessControlStarterEdition11.0makesitsimpletodeployanetworkaccesscontrolthatcanbeleveragedasyourNACdeploymentsmature.WhenpairedwithSymantecEndpointProtection,itcangrantaccessonlytoendpointsthatcomplywithyourdefinedsecuritypoliciesbyevaluatingcompliancestatus,providingautomaticremediationandensuringaccessisproperlyprovisionedandsecured.

SymantecNetworkAccessControlMobileEdition

SymantecCorporation

SymantecNetworkAccessControlMobileEditionworkswithSymantecEndpointProtectionMobileEditiontoenforcecompliancywithsecuritypoliciesandensuresthatonlysecure,policy-compliantdevicescanaccessthenetworkandemail.SupportsWindowsMobileandSymbiansmartphones,andprovidesover-the-aircentralizedmanagementandreporting.

SymantecNetworkAccessControl

SymantecCorporation

SymantecNetworkAccessControlisanetworksecuritysolutionthatcontrolsaccesstocorporatenetworks,enforcesendpointsecuritypolicyandeasilyintegrateswithexistingnetworkinfrastructures.Regardlessofhowendpointsconnecttothenetwork,Symantec'saward-winningnetworksecuritysolutiondiscoversandevaluatesendpointcompliancestatus,provisionstheappropriatenetworkaccessandprovidesautomatedremediationcapabilities.

SWAT

Wise-MonLtd.

SWATisaSoftwareproductthatgivesoverallsolutionfornetworkaccesscontrol(NAC)basedoncheckingthedevicesthatrequirenetworkservices.SWAThasaneasytousewebbasedmanagementinterfacethatenablespolicydefinitionsandaneventconsolethatprovidesinformationaboutalltheeventsinthenetwork.UsingSWATtheorganizationcancontrolandmonitorthedevicesthatconnectedtotheorganizationnetworkindependentlyofthedevicetypeandinfrastructurevendor.SWATisonethemostreliableNACprogramwithhighefficiencyprovedoverlongperiodoftimesince2004whenitsfirstversionwasreleased.SWATissuccessfullyinstalledingovernmentalagencies,banks,insurance,telecom,healthcare,utilitiesandmore.

StillSecureSafeAccess®

StillSecure

Totalcontroloverthosedangerousendpoints.Whyare5ofthetop7networkswitchvendorspartneringwithusforourSafeAccess®NACtechnology?

Whyhave3branchesoftheU.S.militaryrolledoutmassiveSafeAccessimplementations?

WhyhasSafeAccesswonsomanyofthetopindustryawards?

Becauseitistheworld'sbestsecurenetworkaccesscontrol(NAC)product.SafeAccess:

*Prohibitsguestsfrombringingdownthenetwork*Ensuresdeviceshavethelatestpatchesandhavenotbeencompromised*Isfuture-ready,supportingbothDHCPto802.1xnetworkconfigurations*Stopstheinsiderthreattothenetwork*Givesnetworkadminsreal-timestatusoftheendpointenvironment,lettingthemtakeimmediatedeny/allowactiononindividualdevices*Testsendpointsquicklywithoutinhibitingtheenduser*Rollsoutincontrolled,graduatedphases*Provideshelp-deskuserswithagraphicalheads-updisplayofquarantineddevicesandtheactionsrequiredtoremediatethem*Protectsagainstspywareandmalware.Wedeliveritall:

SafeAccessisacompleteNACsolutionthatstopsunauthorizedaccess,preventsmaliciousendpointactivity,andenforcesyourorganization'ssecuritypolicies.Whenwesayit'sa"complete"solution,wemeanthatSafeAccessdeliversthefullrangeofNACfunctionality:

pre-connecttesting,post-connectmonitoring,enforcementandquarantining,identity-basedmanagement,andremediation.

SophosNetworkAccessControl(NAC)Advanced

Sophos,Inc.

SophosNetworkAccessControl(NAC)Advancedsafeguardsdata.NACAdvancedprotectsinformationbypermittingaccesstotheuserswhoneeditandenablescompaniestocreatecomprehensivesecuritypoliciestocheckthatanycomputeraccessingthenetwork–eventhosenotownedbythecompany-areinfullcompliance.NACAdvancedensuresthatcomputers,includingroaminglaptops,arerunningaspecificanti-virussolutionandhavetheirfirewallsenabled.Compliancewithsecuritypolicies*Benefitfromacomprehensiverangeofover1300pre-definedsecurityapplicationandpatchcomplianceassessments*Isolateanycomputerthatdoesnotmatchyourpolicyuntilitisfixed*Simplifycompliancemonitoringandauditingwithpowerfulreporting,andreal-timeandhistoricaldata

SkyReconStormShield

SkyReconSystems,Inc.

Asorganizationsstruggletofindtherightbalancebetweenbusiness-enablement,businessassetprotection,andregulatory/industry/internalpolicycompliance,thelastthingtheyneedistoaddoverheadtotheiralready-stretchedITresourcesduetoapoorendpointsecuritysolutionimplementation.Organizationsshouldnothavetoaddadditionalheavyagentstotheirendpoints,addmorecomplexitytotheirsecuritymanagementprocesses,norintroduceinefficienciestotheircompliancemanagementandauditingprocesses.Atthesametime,ITorganizationsfindtheyhavelessandlesscontrolovertheirendpoints,whichmayincludetheirservers,desktops,mobilelaptops,andotherdevices.Today'sworkersroutinelyrelyonlaptopswhileathomeandontheroad;theybackupcriticalandsensitiveinformationontoUSBdrivesthatslipinto(andsometimesfalloutof)apocket;oruseanarrayofothernewdevicesfromiPodstodata-capablephonestostoreandshareinformation.Inthisincreasinglymobileandcollaborativeenvironment,business-criticaldataandintellectualpropertyisnowstoredonpersonalcomputersanddeviceswhicharelikelyimproperlymanaged,unmanaged,lacksecurity,orarevulnerabletoemployeemisuse,loss,ortheft.Asaresult,volumesofsensitivedataleavethecorporatefacilityeveryday,leavingitexposedtotheworld.Untilrecently,therehavebeennorealoptionsoutsideofriskavoidancegiventheineffectivenessanddisparityofsolutionsavailableinthemarket.Thedifficultyinproactivelymanagingmobiledevicescoupledwiththesignificantincreaseinincidentsinvolvinglaptoplossanddatatheft,theendpointhaseasilytakenthedubioustitleof"weakestlink"Fortunately,thereareanumberofnewtechnologiesavailabletohelporganizationsovercomethischallenge,givingthemoptionstomitigatetheriskofsystemcompromise,datatheft,dataloss,andsystem/datamisuse.

portnox™

AccessLayers

accesslayers'portnox™isthefirstNACproductthatpracticallychecksforthemostimportantmandatorylegitimateaccessfactor:

Isthedeviceattemptingaccessfromwithinthenetworkisaknownandlegitimatecompanydevice?

isitapprovedtoaccessthenetwork?

AtthispointitshouldbecrystalcleartoanyITprofessionalwhatthey’veknownallalong,that:

ThemainproblemisthedeviceconnectingtotheNetwork,andnotitsantivirusstateorthepatchitlacks.Itisobviousthenthatfirstandforemostweneedtoidentifythedeviceattemptingtoconnectthenetworkbeforeitisgrantedwithaccess.portnox™supportmorethan10differentauthenticationschemescustomizedtoyourneedsandt

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 党团工作 > 入党转正申请

copyright@ 2008-2022 冰豆网网站版权所有

经营许可证编号:鄂ICP备2022015515号-1