Risk
7/31/2006
08:55 AM
50%
50%

AEP, Lockdown Partner

Lockdown Networks and AEP Networks announced they have entered into a technology licensing, co-development and marketing partnership

SEATTLE -- Lockdown Networks® and AEP Networks today announced they have entered into a technology licensing, co-development and marketing partnership which will integrate Lockdown’s flagship Network Access Control (NAC) solution, Lockdown Enforcer™, into AEP’s Policy Networking security solutions.

Under the terms of the agreement, Lockdown and AEP will enhance Lockdown’s iNAC™ integration capability to enable use of the Lockdown Enforcer technology to provide endpoint health-check, quarantine and remediation capabilities that work with the AEP Netilla Security Platform (NSP) SSL VPN. The resulting product offering will enable AEP’s installed base of SSL VPN customers to enhance existing secure remote access implementations while solving branch, conference room, guest and partner access “pain points” in a consistent fashion. The joint solution will be available through AEP channel partners.

With seamless security integration from the network through application layers, the joint AEP Networks-Lockdown Networks solution will overcome one of the trickiest security challenges companies face today: providing a uniform approach to ensuring policy-based access, from the edge to the core, throughout the enterprise, regardless of the technology (i.e., remote access via SSL VPN, branch office access via IPSec VPN, guest or conference room access via wireless or wired LAN).

Today, companies work with multiple vendors to deploy point-security solutions that address individual layers of the network stack. This creates time-consuming and arduous implementation and management overhead. By integrating the layers of security, AEP Networks customers will have a one-source shop for total network security.

“The integration of Lockdown’s NAC technology with AEP application access solutions is a natural idea, and delivers exactly what the market has been clamoring for – an integrated approach to addressing enterprise network security needs,” said Brett Helsel, CEO at Lockdown Networks. “We believe AEP’s strong global distribution, sales and support network and excellent portfolio of products adds major value to customers looking for enterprise-class network access control solutions.”

Lockdown Networks Inc.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-0714
Published: 2015-05-02
Multiple cross-site scripting (XSS) vulnerabilities in Cisco Finesse Server 10.0(1), 10.5(1), 10.6(1), and 11.0(1) allow remote attackers to inject arbitrary web script or HTML via unspecified parameters, aka Bug ID CSCut53595.

CVE-2014-3598
Published: 2015-05-01
The Jpeg2KImagePlugin plugin in Pillow before 2.5.3 allows remote attackers to cause a denial of service via a crafted image.

CVE-2014-8361
Published: 2015-05-01
The miniigd SOAP service in Realtek SDK allows remote attackers to execute arbitrary code via a crafted NewInternalClient request.

CVE-2015-0237
Published: 2015-05-01
Red Hat Enterprise Virtualization (RHEV) Manager before 3.5.1 ignores the permission to deny snapshot creation during live storage migration between domains, which allows remote authenticated users to cause a denial of service (prevent host start) by creating a long snapshot chain.

CVE-2015-0257
Published: 2015-05-01
Red Hat Enterprise Virtualization (RHEV) Manager before 3.5.1 uses weak permissions on the directories shared by the ovirt-engine-dwhd service and a plugin during service startup, which allows local users to obtain sensitive information by reading files in the directory.

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.