11:45 AM

Identity Engines Has NAC Solution

Ignition v3.0 includes dynamic network session provisioning and integrated guest access management

MOUNTAIN VIEW, Calif. -- Identity Engines, Inc., a leading provider of network-based identity management solutions, today announced Ignition™ v3.0. The new release is the first and only comprehensive network access solution to include dynamic network session provisioning and integrated guest access management. With Ignition v3.0, organizations can now dynamically adjust network security and access control in real-time based on the user identity. Additional new features with this release include support for strong authentication, enhanced monitoring and reporting, new protocol types and automated configuration tools.

As organizations evolve to support the demand for greater mobile and remote connectivity it has become increasingly difficult for IT departments to ensure consistent and secure access across all network entry points. Ignition simplifies the management of network access control by tightly integrating existing directories with network infrastructure—eliminating the need to support individual repositories for each network access type. Ignition helps to better protect enterprise resources through an identity- and policy-based security model which is gaining momentum in today’s leading enterprise environments.

“We looked at a variety of identity management solutions to help us control network access,” said Chia-Chee Kuan, CTO and VP Engineering of AirMagnet. “We selected the Identity Engines Ignition platform because it allows us to control access for our employees, contractors and guests by leveraging network and directory infrastructure we already had in place. The concept of creating a comprehensive identity-based access-control overlay with a quick appliance-based deployment was most appealing to us.”

Ignition v3.0 provides an unprecedented level of control by unlocking existing under-utilized features in network and security devices while enabling dynamic network session provisioning—making networks easier to manage. Ignition turns previously passive network switches into intelligent identity-aware access-control devices that can actively place users into different network partitions, with different access rights, based on user identity information. These new identity-based provisioning capabilities enable fine-grained control over parameters controlling network segmentation, QoS, and ACLs based on the user requesting access. Additionally, Ignition’s dynamic network access provisioning is vendor-neutral, working with all major networking and security equipment that support the IETF-standard RADIUS protocol, including vendor proprietary extensions.

In addition to identity-based dynamic network access provisioning, Ignition v3.0 includes:

  • Ignition Jumpstart™: a new application designed for enterprise guest and temporary user management that allows companies to lock down open ports in conference rooms and manage secure access to wireless LANs for guests and visitors. Jumpstart is the only application that can manage guest access across wired, wireless, and VPN access points.

  • Ignition Live View™ Monitoring and Auditing: offering compliance reporting of all network access activities via the Ignition centralized network AAA resulting in improved security and regulatory compliance.

  • On-demand data integration of multiple LDAP and Active Directory servers via Ignition: offering easy integration with existing directory and identity systems to allow Ignition to work with the data schema and content that exists today in most organizations. Also leverages identity data, wherever it resides, for determining network level access control.

The new release for Ignition also includes enterprise manageability enhancements ensuring higher system availability, support for EAP-TLS and PEAP-TLS which offers additional secure options for host to network security and encryption, and support for RSA SecurID offering strong authentication capabilities. Additionally, Ignition v3.0 includes support for machine authentication and expands directory support offering with Sun Java System Directory Support.

“We built Ignition to address the needs created by today’s business trends, including the increasing complexity of network and application systems brought about by more access points and components, the movement towards a mobile and distributed workforce and the need to maintain regulatory compliance in the face of these changes,” said Richard Bush, CEO. “With the release of v3.0, we’ve executed on our vision of identity-based networking and provided our customers with a powerful product to manage their network access.”

The Ignition Model 3000E appliance with v3.0 software is available now starting at US$15,000. For more information, visit http://www.idengines.com/products or contact [email protected]

Identity Engines Inc.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
DNS Threats: What Every Enterprise Should Know
Domain Name System exploits could put your data at risk. Here's some advice on how to avoid them.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio

The cybersecurity profession struggles to retain women (figures range from 10 to 20 percent). It's particularly worrisome for an industry with a rapidly growing number of vacant positions.

So why does the shortage of women continue to be worse in security than in other IT sectors? How can men in infosec be better allies for women; and how can women be better allies for one another? What is the industry doing to fix the problem -- what's working, and what isn't?

Is this really a problem at all? Are the low numbers simply an indication that women do not want to be in cybersecurity, and is it possible that more women will never want to be in cybersecurity? How many women would we need to see in the industry to declare success?

Join Dark Reading senior editor Sara Peters and guests Angela Knox of Cloudmark, Barrett Sellers of Arbor Networks, Regina Wallace-Jones of Facebook, Steve Christey Coley of MITRE, and Chris Roosenraad of M3AAWG on Wednesday, July 13 at 1 p.m. Eastern Time to discuss all this and more.