Endpoint
10/6/2010
12:51 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Avenda Systems To Preview New Access Security Solutions

New features provide campuswide network notifications, proactive management

Santa Clara, Calif. – Oct. 6, 2010 – Avenda Systems, the innovation leader in network access security, today announced it is exhibiting at EDUCAUSE 2010 next week in Anaheim, Calif., Oct. 12 – 14, based on strong growth of its network access security solution in the higher education market. In addition, Avenda customer the University of San Diego will host a session titled, “Network Neighborhood? Who's on Your Wi-Fi?” presented by Douglas Burke, IT Director at USD, on Thursday, Oct. 14, at 8 am in Ballroom E at the Anaheim Convention Center.

Avenda’s integrated network access control and AAA solution enables educational institutions to improve the management of user and device authentication and authorization in 802.1X and non-802.1X networks for wireless, VPN, wired, and residence hall access. Avenda’s innovative rich policy model, extensive reporting and analysis, and multiple ease-of-use features allow for efficient implementation of services while satisfying compliance requirements and driving operational cost savings.

As campus networks evolve to support anywhere Wi-Fi and a host of new, user owned devices, the need for an easy-to-use and flexible authentication and authorization solution is a priority for education institutions of all sizes. Avenda’s support of Windows, Mac OS X, Mac iOS, and Linux platforms; guest access; and device registration have given higher education IT teams the ability to add stronger security, and troubleshooting tools without impacting their user community. Highlights of what Avenda will demonstrate at EDUCAUSE 2010 include:

• Pro-active endpoint assessments of Peer-to-Peer applications, services and user information

• Campus-wide network notifications

– Policy updates, emergency notifications, and violation notices

• Non 802.1X and 802.1X authentication and authorization features

“Our expertise in identity-based access control and security gives us the ability to offer our higher education customers a full-service solution and unmatched customer support,” said Krishna Prabhakar, CEO at Avenda. “EDUCAUSE has been an excellent way for Avenda to touch base with existing customers and new higher ed prospects, listen to their evolving security challenges, and partner with them to meet those needs.”

To learn more about how Avenda’s next-generation solution can satisfy your network access requirements, visit Avenda at Booth 803 in the Exhibit Hall. For registration or other event information, visit: http://www.educause.edu/E2010

About Avenda

Avenda’s Identity-based access control platform delivers industry proven employee, guest and endpoint access management for multi-vendor wired, wireless and VPN networks. Avenda has been recognized for innovation excellence, including being positioned as a Visionary in Gartner’s 2010 Magic Quadrant for Network Access Control report, and being named a Gartner Cool Vendor in Identity and Access Management, 2010. Further information: http://www.avendasys.com

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-9710
Published: 2015-05-27
The Btrfs implementation in the Linux kernel before 3.19 does not ensure that the visible xattr state is consistent with a requested replacement, which allows local users to bypass intended ACL settings and gain privileges via standard filesystem operations (1) during an xattr-replacement time windo...

CVE-2014-9715
Published: 2015-05-27
include/net/netfilter/nf_conntrack_extend.h in the netfilter subsystem in the Linux kernel before 3.14.5 uses an insufficiently large data type for certain extension data, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) via outbound network traffic that trig...

CVE-2015-1157
Published: 2015-05-27
CoreText in Apple iOS 8.x through 8.3 allows remote attackers to cause a denial of service (reboot and messaging disruption) via crafted Unicode text that is not properly handled during display truncation in the Notifications feature, as demonstrated by Arabic characters in (1) an SMS message or (2)...

CVE-2015-2666
Published: 2015-05-27
Stack-based buffer overflow in the get_matching_model_microcode function in arch/x86/kernel/cpu/microcode/intel_early.c in the Linux kernel before 4.0 allows context-dependent attackers to gain privileges by constructing a crafted microcode header and leveraging root privileges for write access to t...

CVE-2015-2830
Published: 2015-05-27
arch/x86/kernel/entry_64.S in the Linux kernel before 3.19.2 does not prevent the TS_COMPAT flag from reaching a user-mode task, which might allow local users to bypass the seccomp or audit protection mechanism via a crafted application that uses the (1) fork or (2) close system call, as demonstrate...

Dark Reading Radio
Archived Dark Reading Radio
After a serious cybersecurity incident, everyone will be looking to you for answers -- but you’ll never have complete information and you’ll never have enough time. So in those heated moments, when a business is on the brink of collapse, how will you and the rest of the board room executives respond?