Endpoint
10/6/2010
12:51 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Avenda Systems To Preview New Access Security Solutions

New features provide campuswide network notifications, proactive management

Santa Clara, Calif. – Oct. 6, 2010 – Avenda Systems, the innovation leader in network access security, today announced it is exhibiting at EDUCAUSE 2010 next week in Anaheim, Calif., Oct. 12 – 14, based on strong growth of its network access security solution in the higher education market. In addition, Avenda customer the University of San Diego will host a session titled, “Network Neighborhood? Who's on Your Wi-Fi?” presented by Douglas Burke, IT Director at USD, on Thursday, Oct. 14, at 8 am in Ballroom E at the Anaheim Convention Center.

Avenda’s integrated network access control and AAA solution enables educational institutions to improve the management of user and device authentication and authorization in 802.1X and non-802.1X networks for wireless, VPN, wired, and residence hall access. Avenda’s innovative rich policy model, extensive reporting and analysis, and multiple ease-of-use features allow for efficient implementation of services while satisfying compliance requirements and driving operational cost savings.

As campus networks evolve to support anywhere Wi-Fi and a host of new, user owned devices, the need for an easy-to-use and flexible authentication and authorization solution is a priority for education institutions of all sizes. Avenda’s support of Windows, Mac OS X, Mac iOS, and Linux platforms; guest access; and device registration have given higher education IT teams the ability to add stronger security, and troubleshooting tools without impacting their user community. Highlights of what Avenda will demonstrate at EDUCAUSE 2010 include:

• Pro-active endpoint assessments of Peer-to-Peer applications, services and user information

• Campus-wide network notifications

– Policy updates, emergency notifications, and violation notices

• Non 802.1X and 802.1X authentication and authorization features

“Our expertise in identity-based access control and security gives us the ability to offer our higher education customers a full-service solution and unmatched customer support,” said Krishna Prabhakar, CEO at Avenda. “EDUCAUSE has been an excellent way for Avenda to touch base with existing customers and new higher ed prospects, listen to their evolving security challenges, and partner with them to meet those needs.”

To learn more about how Avenda’s next-generation solution can satisfy your network access requirements, visit Avenda at Booth 803 in the Exhibit Hall. For registration or other event information, visit: http://www.educause.edu/E2010

About Avenda

Avenda’s Identity-based access control platform delivers industry proven employee, guest and endpoint access management for multi-vendor wired, wireless and VPN networks. Avenda has been recognized for innovation excellence, including being positioned as a Visionary in Gartner’s 2010 Magic Quadrant for Network Access Control report, and being named a Gartner Cool Vendor in Identity and Access Management, 2010. Further information: http://www.avendasys.com

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6117
Published: 2014-07-11
Dahua DVR 2.608.0000.0 and 2.608.GV00.0 allows remote attackers to bypass authentication and obtain sensitive information including user credentials, change user passwords, clear log files, and perform other actions via a request to TCP port 37777.

CVE-2014-0174
Published: 2014-07-11
Cumin (aka MRG Management Console), as used in Red Hat Enterprise MRG 2.5, does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie.

CVE-2014-3485
Published: 2014-07-11
The REST API in the ovirt-engine in oVirt, as used in Red Hat Enterprise Virtualization (rhevm) 3.4, allows remote authenticated users to read arbitrary files and have other unspecified impact via unknown vectors, related to an XML External Entity (XXE) issue.

CVE-2014-3499
Published: 2014-07-11
Docker 1.0.0 uses world-readable and world-writable permissions on the management socket, which allows local users to gain privileges via unspecified vectors.

CVE-2014-3503
Published: 2014-07-11
Apache Syncope 1.1.x before 1.1.8 uses weak random values to generate passwords, which makes it easier for remote attackers to guess the password via a brute force attack.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Marilyn Cohodas and her guests look at the evolving nature of the relationship between CIO and CSO.