01:02 AM

Foundry Certifies Lockdown

Foundry Networks and Lockdown Networks announced that Lockdown has joined the Foundry IronShield 360 Network Security Alliance

SEATTLE -- Foundry Networks(r), Inc. (Nasdaq:FDRY), a performance and total solutions leader for end-to-end switching and routing, and Lockdown Networks(r), a leading provider of Network Access Control (NAC) solutions, today announced that Lockdown has joined the Foundry IronShield(tm) 360 Network Security Alliance. The Alliance was formed by Foundry Networks to help enterprises build secure, scalable and high-performance network infrastructures with interoperable best-of-breed multi-vendor solutions. The collaboration will integrate one of the industry's most comprehensive and powerful NAC solutions, Lockdown Enforcer(tm), with Foundry-powered infrastructures to ensure all networking devices comply with enterprise security policies.

The Foundry IronShield 360 Security Alliance brings together open, interoperable, best-of-breed security companies to complement a comprehensive suite of award-winning Foundry network solutions. Lockdown Enforcer is an all-in-one NAC appliance that provides authentication, assessment, enforcement and remediation to enforce compliance to security and IT policies for every device on the network. Lockdown Enforcer makes access decisions based on user identity, device health, location and other factors. Lockdown NAC enforces access control by interfacing with managed switches and wireless access points, automatically granting access or quarantining devices based on conformance to security policies.

"This partnership with Foundry Networks is truly exciting as it extends the reach of Lockdown NAC to enterprises requiring more sophisticated network security and user access control, providing IT professionals with a compelling new option for managing increasingly complex security challenges," said Brett Helsel, chief executive officer for Lockdown Networks. "Foundry and Lockdown will deliver an easy-to-use solution that meets these challenges without locking companies into proprietary security architecture-lowering overall costs and allowing companies to fully leverage existing infrastructure investments."

Foundry Networks Inc. (Nasdaq: FDRY)

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Current Issue
5 Security Technologies to Watch in 2017
Emerging tools and services promise to make a difference this year. Are they on your company's list?
Flash Poll
Secure Application Development - New Best Practices
Secure Application Development - New Best Practices
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.