Endpoint
10/13/2010
12:41 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Avenda Systems Announces New Security Enhancements For Endpoint Control

Avenda OnGuard is a new family of network access agents

Santa Clara, Calif. -- Oct. 12, 2010 – Avenda Systems, the innovation leader in network access security, today announced Avenda OnGuard, a new family of network access agents, as well as enhanced support of External Captive Portals for Meru wireless controllers and Cisco switches. These new enhancements position Avenda’s flagship eTIPS network access control and AAA platform as the industry’s most feature-rich solution for managing access privileges across early and current Windows versions, Mac OS X, and Linux operating systems using standards-based, 802.1X or non-802.1X security methods.

Deployed in conjunction with eTIPS 3.5, Avenda’s OnGuard agents enable organizations to proactively manage the use of peer-to-peer applications and services on their networks and send system wide, network notifications to its users. For example, users can be notified of digital rights management (DRM) violations and associated corrective action. Additionally, users can be removed or bounced from the network, or blacklisted if they are not in compliance with an organization’s standard policy requirements. The health status of devices – such as anti-malware, firewall, peer-to-peer and the latest patches – can also be used to create a deeper level of compliance policies.

“Avenda’s new OnGuard agents provide a seamless way to monitor user and device information while taking advantage of legacy security mechanisms,” said John Call, Systems and Network analyst at BYU– Hawaii. “I can see how the additional visibility and safeguards would benefit education and enterprise organizations alike – for not only security, but also for network troubleshooting and compliance mandates as well.”

New support of external captive portals for Meru wireless controllers and Cisco Ethernet switches enables organizations to offload web-based authentication to Avenda’s eTIPS and add endpoint health checking that the Meru and Cisco devices cannot perform on their own. This enables the use of external laptops by guests, partners, contractors and employees by authenticating devices against specific access policies created for users’ roles.

“Avenda’s latest release allows us to continue our technical leadership by enhancing our overall solution based on customer feedback and evolving industry requirements,” said Santhosh Cheeniyil, VP of Engineering at Avenda Systems. “With the introduction of eTIPS 3.5, these new applications and additional platform enhancements provide the industry’s only full-featured network access security platform for any use-case, any environment.”

Highlights of Avenda’s new release include the following industry firsts:

Ability to apply consistent network access security and endpoint health checks in a mix of 802.1X and non-802.1X (SNMP and SSH) environments

Greater visibility and control across all operating system versions – agent and agentless alternatives

Enhanced compliance management of Peer-to-Peer applications, services and anti-malware

Availability

The new OnGuard agents, external captive portal support, and Avenda’s eTIPS 3.5 release will be available directly from Avenda and authorized partners in early November.

About Avenda

Avenda’s Identity-based access control platform delivers industry proven employee, guest and endpoint access management for multi-vendor wired, wireless and VPN networks. Avenda has been recognized for innovation excellence, including being positioned as a Visionary in Gartner’s 2010 Magic Quadrant for Network Access Control report, and being named a Gartner Cool Vendor in Identity and Access Management, 2010. Further information: http://www.avendasys.com

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-4988
Published: 2014-07-09
Heap-based buffer overflow in the xjpegls.dll (aka JLS, JPEG-LS, or JPEG lossless) format plugin in XnView 1.99 and 1.99.1 allows remote attackers to execute arbitrary code via a crafted JLS image file.

CVE-2014-0207
Published: 2014-07-09
The cdf_read_short_sector function in cdf.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted CDF file.

CVE-2014-0537
Published: 2014-07-09
Adobe Flash Player before 13.0.0.231 and 14.x before 14.0.0.145 on Windows and OS X and before 11.2.202.394 on Linux, Adobe AIR before 14.0.0.137 on Android, Adobe AIR SDK before 14.0.0.137, and Adobe AIR SDK & Compiler before 14.0.0.137 allow attackers to bypass intended access restrictions via uns...

CVE-2014-0539
Published: 2014-07-09
Adobe Flash Player before 13.0.0.231 and 14.x before 14.0.0.145 on Windows and OS X and before 11.2.202.394 on Linux, Adobe AIR before 14.0.0.137 on Android, Adobe AIR SDK before 14.0.0.137, and Adobe AIR SDK & Compiler before 14.0.0.137 allow attackers to bypass intended access restrictions via uns...

CVE-2014-3309
Published: 2014-07-09
The NTP implementation in Cisco IOS and IOS XE does not properly support use of the access-group command for a "deny all" configuration, which allows remote attackers to bypass intended restrictions on time synchronization via a standard query, aka Bug ID CSCuj66318.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Marilyn Cohodas and her guests look at the evolving nature of the relationship between CIO and CSO.