Endpoint
9/27/2010
10:40 AM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Impulse Point Announces SafeConnect 5.0

Safe.Connect 5.0 includes improved real-time policy reporting dashboard interface

TAMPA, FL - September 27, 2010- Impulse Point, provider of the most scalable network access control (NAC) solution for complex, diverse enterprise networks, today announced the latest version of its flagship product, Safe.Connect 5.0. Safe.Connect enables organizations such as UCLA, Northern Arizona University, University of Florida, and Mid-Florida Credit Union to easily manage end user authentication, guest management, anti-virus, anti-spyware, Microsoft security patches, P2P file sharing, and custom policies. New features in Safe.Connect 5.0, such as policy enforcement integration with Aruba Wireless Controllers, enhanced endpoint profiling device recognition, and improved guest access sponsorship capabilities allow Impulse Point to address the evolving challenges of pervasive mobile computing within large organizations.

Originally developed for the higher education market, Safe.Connect NAC is designed to function uniformly in diverse network architectures. Higher education environments are more difficult to safeguard than most corporate environments because IT must accommodate a large and diverse range of unmanaged, personally-owned computing devices, while providing the flexibility to adhere to each institution's philosophy regarding academic freedom and open computing. As the "Consumerization of IT" takes hold, corporate environments are starting to more closely resemble higher education campuses as IT contends with the growing influx of diverse, unmanaged wireless devices on corporate networks. Safe.Connect is uniquely positioned to deliver a more secure, reliable, and predictable IT infrastructure that is easy and cost-effective to deploy and maintain.

"As with past disruptive technology trends, higher education is on the leading edge with students connecting the newest devices to campus networks," said Max Garcia, vice president of product development at Impulse Point. "Based on the market that we serve, we are committed to rapidly supporting the diversity of endpoint devices required to keep pace with the Consumerization of IT computing model."

"Network Access Control services such as Safe.Connect are critical for organizations as they are exposed to the security implications of mobile devices and as network security compliance becomes more business critical," said Robert Fenstermacher, head of education marketing, Aruba Networks.

"NAC with policy assessment is essential for any academic network where students, employees and visitors regularly bring in machines that are not under institutional management. Safe.Connect provides a superior user experience, and the company's support is phenomenal," said Charlie Prothero, chief information officer at Keystone College. "We recently conducted an exhaustive review of wireless network technologies for our residence halls and selected Aruba. The two products together provide flexibility we have not seen from anyone else."

Features new to Safe.Connect Version 5.0 include: . New policy enforcement integration with Aruba Wireless Controllers . Improved real-time policy reporting dashboard interface . Enhanced profiling, granular policy control and reporting for additional devices, such as smart phones and gaming devices . Delegated access to guest management sponsorship and on-demand emergency broadcast messaging . Support for additional Windows and Apple Mac Anti-Virus software vendors . Third party application version control for Windows platform for applications, such as Adobe Flash . Safe.Connect OpenNAC API integration enhancements . New system configuration and administration portal

Additional Resources . ROI calculator: http://www.impulse.com/nac-roi.php . Free webinar: webdemo@impulse.com . Customer case studies: http://www.impulse.com/literature.php

About Impulse Point Impulse Point delivers the industry's easiest to deploy and manage Network Access Control (NAC) solution to address endpoint policies relating to intellectual property, security, and regulatory compliance within large, heterogeneous enterprise environments. Impulse Point's Safe.ConnectT Enterprise NAC Solution is supported by an operationally managed service and enables organizations to automate and enforce end user authentication, anti-virus, anti-spyware, Microsoft security patches, P2P file sharing, power management, and custom endpoint security policies. The result is a more secure, reliable, and predictable IT infrastructure. Impulse Point (www.impulse.com) is headquartered in Florida's High Tech Corridor.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-0360
Published: 2014-04-23
Memory leak in Cisco IOS before 15.1(1)SY, when IKEv2 debugging is enabled, allows remote attackers to cause a denial of service (memory consumption) via crafted packets, aka Bug ID CSCtn22376.

CVE-2012-1317
Published: 2014-04-23
The multicast implementation in Cisco IOS before 15.1(1)SY allows remote attackers to cause a denial of service (Route Processor crash) by sending packets at a high rate, aka Bug ID CSCts37717.

CVE-2012-1366
Published: 2014-04-23
Cisco IOS before 15.1(1)SY on ASR 1000 devices, when Multicast Listener Discovery (MLD) tracking is enabled for IPv6, allows remote attackers to cause a denial of service (device reload) via crafted MLD packets, aka Bug ID CSCtz28544.

CVE-2012-3062
Published: 2014-04-23
Cisco IOS before 15.1(1)SY, when Multicast Listener Discovery (MLD) snooping is enabled, allows remote attackers to cause a denial of service (CPU consumption or device crash) via MLD packets on a network that contains many IPv6 hosts, aka Bug ID CSCtr88193.

CVE-2012-3918
Published: 2014-04-23
Cisco IOS before 15.3(1)T on Cisco 2900 devices, when a VWIC2-2MFT-T1/E1 card is configured for TDM/HDLC mode, allows remote attackers to cause a denial of service (serial-interface outage) via certain Frame Relay traffic, aka Bug ID CSCub13317.

Best of the Web