01:02 AM

Foundry Certifies Lockdown

Foundry Networks and Lockdown Networks announced that Lockdown has joined the Foundry IronShield 360 Network Security Alliance

SEATTLE -- Foundry Networks(r), Inc. (Nasdaq:FDRY), a performance and total solutions leader for end-to-end switching and routing, and Lockdown Networks(r), a leading provider of Network Access Control (NAC) solutions, today announced that Lockdown has joined the Foundry IronShield(tm) 360 Network Security Alliance. The Alliance was formed by Foundry Networks to help enterprises build secure, scalable and high-performance network infrastructures with interoperable best-of-breed multi-vendor solutions. The collaboration will integrate one of the industry's most comprehensive and powerful NAC solutions, Lockdown Enforcer(tm), with Foundry-powered infrastructures to ensure all networking devices comply with enterprise security policies.

The Foundry IronShield 360 Security Alliance brings together open, interoperable, best-of-breed security companies to complement a comprehensive suite of award-winning Foundry network solutions. Lockdown Enforcer is an all-in-one NAC appliance that provides authentication, assessment, enforcement and remediation to enforce compliance to security and IT policies for every device on the network. Lockdown Enforcer makes access decisions based on user identity, device health, location and other factors. Lockdown NAC enforces access control by interfacing with managed switches and wireless access points, automatically granting access or quarantining devices based on conformance to security policies.

"This partnership with Foundry Networks is truly exciting as it extends the reach of Lockdown NAC to enterprises requiring more sophisticated network security and user access control, providing IT professionals with a compelling new option for managing increasingly complex security challenges," said Brett Helsel, chief executive officer for Lockdown Networks. "Foundry and Lockdown will deliver an easy-to-use solution that meets these challenges without locking companies into proprietary security architecture-lowering overall costs and allowing companies to fully leverage existing infrastructure investments."

Foundry Networks Inc. (Nasdaq: FDRY)

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Latest Comment: nice one
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-04-17
Format string vulnerability in Movable Type Pro, Open Source, and Advanced before 5.2.13 and Pro and Advanced 6.0.x before 6.0.8 allows remote attackers to execute arbitrary code via vectors related to localization of templates.

Published: 2015-04-17
Multiple cross-site scripting (XSS) vulnerabilities in SearchBlox before 8.2 allow remote attackers to inject arbitrary web script or HTML via (1) the search field in plugin/index.html or (2) the title field in the Create Featured Result form in admin/main.jsp.

Published: 2015-04-17
Unrestricted file upload vulnerability in admin/uploadImage.html in SearchBlox before 8.2 allows remote attackers to execute arbitrary code by uploading a file with an executable extension and the image/jpeg content type, a different vulnerability than CVE-2013-3590.

Published: 2015-04-17
SearchBlox before 8.2 allows remote attackers to obtain sensitive information via a pretty=true action to the _cluster/health URI.

Published: 2015-04-17
Cross-site request forgery (CSRF) vulnerability in SearchBlox before 8.2 allows remote attackers to hijack the authentication of arbitrary users.

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.