Risk
7/31/2006
08:55 AM
Connect Directly
RSS
E-Mail
50%
50%

AEP, Lockdown Partner

Lockdown Networks and AEP Networks announced they have entered into a technology licensing, co-development and marketing partnership

SEATTLE -- Lockdown Networks® and AEP Networks today announced they have entered into a technology licensing, co-development and marketing partnership which will integrate Lockdown’s flagship Network Access Control (NAC) solution, Lockdown Enforcer™, into AEP’s Policy Networking security solutions.

Under the terms of the agreement, Lockdown and AEP will enhance Lockdown’s iNAC™ integration capability to enable use of the Lockdown Enforcer technology to provide endpoint health-check, quarantine and remediation capabilities that work with the AEP Netilla Security Platform (NSP) SSL VPN. The resulting product offering will enable AEP’s installed base of SSL VPN customers to enhance existing secure remote access implementations while solving branch, conference room, guest and partner access “pain points” in a consistent fashion. The joint solution will be available through AEP channel partners.

With seamless security integration from the network through application layers, the joint AEP Networks-Lockdown Networks solution will overcome one of the trickiest security challenges companies face today: providing a uniform approach to ensuring policy-based access, from the edge to the core, throughout the enterprise, regardless of the technology (i.e., remote access via SSL VPN, branch office access via IPSec VPN, guest or conference room access via wireless or wired LAN).

Today, companies work with multiple vendors to deploy point-security solutions that address individual layers of the network stack. This creates time-consuming and arduous implementation and management overhead. By integrating the layers of security, AEP Networks customers will have a one-source shop for total network security.

“The integration of Lockdown’s NAC technology with AEP application access solutions is a natural idea, and delivers exactly what the market has been clamoring for – an integrated approach to addressing enterprise network security needs,” said Brett Helsel, CEO at Lockdown Networks. “We believe AEP’s strong global distribution, sales and support network and excellent portfolio of products adds major value to customers looking for enterprise-class network access control solutions.”

Lockdown Networks Inc.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2970
Published: 2014-07-31
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-5139. Reason: This candidate is a duplicate of CVE-2014-5139, and has also been used to refer to an unrelated topic that is currently outside the scope of CVE. This unrelated topic is a LibreSSL code change adding functionality ...

CVE-2014-0914
Published: 2014-07-30
Cross-site scripting (XSS) vulnerability in IBM Maximo Asset Management 6.2 through 6.2.8 and 6.x and 7.x through 7.5.0.6, Maximo Asset Management 7.5 through 7.5.0.3 and 7.5.1 through 7.5.1.2 for SmartCloud Control Desk, and Maximo Asset Management 6.2 through 6.2.8 for Tivoli IT Asset Management f...

CVE-2014-0915
Published: 2014-07-30
Multiple cross-site scripting (XSS) vulnerabilities in IBM Maximo Asset Management 6.2 through 6.2.8, 6.x and 7.1 through 7.1.1.2, and 7.5 through 7.5.0.6; Maximo Asset Management 7.5 through 7.5.0.3 and 7.5.1 through 7.5.1.2 for SmartCloud Control Desk; and Maximo Asset Management 6.2 through 6.2.8...

CVE-2014-0947
Published: 2014-07-30
Unspecified vulnerability in the server in IBM Rational Software Architect Design Manager 4.0.6 allows remote authenticated users to execute arbitrary code via a crafted update site.

CVE-2014-0948
Published: 2014-07-30
Unspecified vulnerability in IBM Rational Software Architect Design Manager and Rational Rhapsody Design Manager 3.x and 4.x before 4.0.7 allows remote authenticated users to execute arbitrary code via a crafted ZIP archive.

Best of the Web
Dark Reading Radio