Risk
7/31/2006
08:55 AM
50%
50%

AEP, Lockdown Partner

Lockdown Networks and AEP Networks announced they have entered into a technology licensing, co-development and marketing partnership

SEATTLE -- Lockdown Networks® and AEP Networks today announced they have entered into a technology licensing, co-development and marketing partnership which will integrate Lockdown’s flagship Network Access Control (NAC) solution, Lockdown Enforcer™, into AEP’s Policy Networking security solutions.

Under the terms of the agreement, Lockdown and AEP will enhance Lockdown’s iNAC™ integration capability to enable use of the Lockdown Enforcer technology to provide endpoint health-check, quarantine and remediation capabilities that work with the AEP Netilla Security Platform (NSP) SSL VPN. The resulting product offering will enable AEP’s installed base of SSL VPN customers to enhance existing secure remote access implementations while solving branch, conference room, guest and partner access “pain points” in a consistent fashion. The joint solution will be available through AEP channel partners.

With seamless security integration from the network through application layers, the joint AEP Networks-Lockdown Networks solution will overcome one of the trickiest security challenges companies face today: providing a uniform approach to ensuring policy-based access, from the edge to the core, throughout the enterprise, regardless of the technology (i.e., remote access via SSL VPN, branch office access via IPSec VPN, guest or conference room access via wireless or wired LAN).

Today, companies work with multiple vendors to deploy point-security solutions that address individual layers of the network stack. This creates time-consuming and arduous implementation and management overhead. By integrating the layers of security, AEP Networks customers will have a one-source shop for total network security.

“The integration of Lockdown’s NAC technology with AEP application access solutions is a natural idea, and delivers exactly what the market has been clamoring for – an integrated approach to addressing enterprise network security needs,” said Brett Helsel, CEO at Lockdown Networks. “We believe AEP’s strong global distribution, sales and support network and excellent portfolio of products adds major value to customers looking for enterprise-class network access control solutions.”

Lockdown Networks Inc.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2174
Published: 2015-05-24
Cisco TelePresence T, TelePresence TE, and TelePresence TC before 7.1 do not properly implement access control, which allows remote attackers to obtain root privileges by sending packets on the local network and allows physically proximate attackers to obtain root privileges via unspecified vectors,...

CVE-2015-0713
Published: 2015-05-24
The web framework in Cisco TelePresence Advanced Media Gateway Series Software before 1.1(1.40), Cisco TelePresence IP Gateway Series Software, Cisco TelePresence IP VCR Series Software before 3.0(1.27), Cisco TelePresence ISDN Gateway Software before 2.2(1.94), Cisco TelePresence MCU Software befor...

CVE-2015-0722
Published: 2015-05-24
The network drivers in Cisco TelePresence T, Cisco TelePresence TE, and Cisco TelePresence TC before 7.3.2 allow remote attackers to cause a denial of service (process restart or device reload) via a flood of crafted IP packets, aka Bug ID CSCuj68952.

CVE-2015-1894
Published: 2015-05-24
Cross-site request forgery (CSRF) vulnerability in IBM InfoSphere Optim Workload Replay 2.x before 2.1.0.3 allows remote attackers to hijack the authentication of arbitrary users for requests that insert XSS sequences.

CVE-2015-1895
Published: 2015-05-24
IBM InfoSphere Optim Workload Replay 2.x before 2.1.0.3 relies on client-side code to verify authorization, which allows remote attackers to bypass intended access restrictions by modifying the client behavior.

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.