Endpoint
10/6/2010
12:51 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Avenda Systems To Preview New Access Security Solutions

New features provide campuswide network notifications, proactive management

Santa Clara, Calif. – Oct. 6, 2010 – Avenda Systems, the innovation leader in network access security, today announced it is exhibiting at EDUCAUSE 2010 next week in Anaheim, Calif., Oct. 12 – 14, based on strong growth of its network access security solution in the higher education market. In addition, Avenda customer the University of San Diego will host a session titled, “Network Neighborhood? Who's on Your Wi-Fi?” presented by Douglas Burke, IT Director at USD, on Thursday, Oct. 14, at 8 am in Ballroom E at the Anaheim Convention Center.

Avenda’s integrated network access control and AAA solution enables educational institutions to improve the management of user and device authentication and authorization in 802.1X and non-802.1X networks for wireless, VPN, wired, and residence hall access. Avenda’s innovative rich policy model, extensive reporting and analysis, and multiple ease-of-use features allow for efficient implementation of services while satisfying compliance requirements and driving operational cost savings.

As campus networks evolve to support anywhere Wi-Fi and a host of new, user owned devices, the need for an easy-to-use and flexible authentication and authorization solution is a priority for education institutions of all sizes. Avenda’s support of Windows, Mac OS X, Mac iOS, and Linux platforms; guest access; and device registration have given higher education IT teams the ability to add stronger security, and troubleshooting tools without impacting their user community. Highlights of what Avenda will demonstrate at EDUCAUSE 2010 include:

• Pro-active endpoint assessments of Peer-to-Peer applications, services and user information

• Campus-wide network notifications

– Policy updates, emergency notifications, and violation notices

• Non 802.1X and 802.1X authentication and authorization features

“Our expertise in identity-based access control and security gives us the ability to offer our higher education customers a full-service solution and unmatched customer support,” said Krishna Prabhakar, CEO at Avenda. “EDUCAUSE has been an excellent way for Avenda to touch base with existing customers and new higher ed prospects, listen to their evolving security challenges, and partner with them to meet those needs.”

To learn more about how Avenda’s next-generation solution can satisfy your network access requirements, visit Avenda at Booth 803 in the Exhibit Hall. For registration or other event information, visit: http://www.educause.edu/E2010

About Avenda

Avenda’s Identity-based access control platform delivers industry proven employee, guest and endpoint access management for multi-vendor wired, wireless and VPN networks. Avenda has been recognized for innovation excellence, including being positioned as a Visionary in Gartner’s 2010 Magic Quadrant for Network Access Control report, and being named a Gartner Cool Vendor in Identity and Access Management, 2010. Further information: http://www.avendasys.com

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2011-0460
Published: 2014-04-16
The init script in kbd, possibly 1.14.1 and earlier, allows local users to overwrite arbitrary files via a symlink attack on /dev/shm/defkeymap.map.

CVE-2011-0993
Published: 2014-04-16
SUSE Lifecycle Management Server before 1.1 uses world readable postgres credentials, which allows local users to obtain sensitive information via unspecified vectors.

CVE-2011-3180
Published: 2014-04-16
kiwi before 4.98.08, as used in SUSE Studio Onsite 1.2 before 1.2.1 and SUSE Studio Extension for System z 1.2 before 1.2.1, allows attackers to execute arbitrary commands via shell metacharacters in the path of an overlay file, related to chown.

CVE-2011-4089
Published: 2014-04-16
The bzexe command in bzip2 1.0.5 and earlier generates compressed executables that do not properly handle temporary files during extraction, which allows local users to execute arbitrary code by precreating a temporary directory.

CVE-2011-4192
Published: 2014-04-16
kiwi before 4.85.1, as used in SUSE Studio Onsite 1.2 before 1.2.1 and SUSE Studio Extension for System z 1.2 before 1.2.1, allows attackers to execute arbitrary commands as demonstrated by "double quotes in kiwi_oemtitle of .profile."

Best of the Web