Risk
4/30/2006
11:45 AM
50%
50%

Identity Engines Has NAC Solution

Ignition v3.0 includes dynamic network session provisioning and integrated guest access management

MOUNTAIN VIEW, Calif. -- Identity Engines, Inc., a leading provider of network-based identity management solutions, today announced Ignition™ v3.0. The new release is the first and only comprehensive network access solution to include dynamic network session provisioning and integrated guest access management. With Ignition v3.0, organizations can now dynamically adjust network security and access control in real-time based on the user identity. Additional new features with this release include support for strong authentication, enhanced monitoring and reporting, new protocol types and automated configuration tools.

As organizations evolve to support the demand for greater mobile and remote connectivity it has become increasingly difficult for IT departments to ensure consistent and secure access across all network entry points. Ignition simplifies the management of network access control by tightly integrating existing directories with network infrastructure—eliminating the need to support individual repositories for each network access type. Ignition helps to better protect enterprise resources through an identity- and policy-based security model which is gaining momentum in today’s leading enterprise environments.

“We looked at a variety of identity management solutions to help us control network access,” said Chia-Chee Kuan, CTO and VP Engineering of AirMagnet. “We selected the Identity Engines Ignition platform because it allows us to control access for our employees, contractors and guests by leveraging network and directory infrastructure we already had in place. The concept of creating a comprehensive identity-based access-control overlay with a quick appliance-based deployment was most appealing to us.”

Ignition v3.0 provides an unprecedented level of control by unlocking existing under-utilized features in network and security devices while enabling dynamic network session provisioning—making networks easier to manage. Ignition turns previously passive network switches into intelligent identity-aware access-control devices that can actively place users into different network partitions, with different access rights, based on user identity information. These new identity-based provisioning capabilities enable fine-grained control over parameters controlling network segmentation, QoS, and ACLs based on the user requesting access. Additionally, Ignition’s dynamic network access provisioning is vendor-neutral, working with all major networking and security equipment that support the IETF-standard RADIUS protocol, including vendor proprietary extensions.

In addition to identity-based dynamic network access provisioning, Ignition v3.0 includes:

  • Ignition Jumpstart™: a new application designed for enterprise guest and temporary user management that allows companies to lock down open ports in conference rooms and manage secure access to wireless LANs for guests and visitors. Jumpstart is the only application that can manage guest access across wired, wireless, and VPN access points.

  • Ignition Live View™ Monitoring and Auditing: offering compliance reporting of all network access activities via the Ignition centralized network AAA resulting in improved security and regulatory compliance.

  • On-demand data integration of multiple LDAP and Active Directory servers via Ignition: offering easy integration with existing directory and identity systems to allow Ignition to work with the data schema and content that exists today in most organizations. Also leverages identity data, wherever it resides, for determining network level access control.

The new release for Ignition also includes enterprise manageability enhancements ensuring higher system availability, support for EAP-TLS and PEAP-TLS which offers additional secure options for host to network security and encryption, and support for RSA SecurID offering strong authentication capabilities. Additionally, Ignition v3.0 includes support for machine authentication and expands directory support offering with Sun Java System Directory Support.

“We built Ignition to address the needs created by today’s business trends, including the increasing complexity of network and application systems brought about by more access points and components, the movement towards a mobile and distributed workforce and the need to maintain regulatory compliance in the face of these changes,” said Richard Bush, CEO. “With the release of v3.0, we’ve executed on our vision of identity-based networking and provided our customers with a powerful product to manage their network access.”

The Ignition Model 3000E appliance with v3.0 software is available now starting at US$15,000. For more information, visit http://www.idengines.com/products or contact [email protected]

Identity Engines Inc.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: The latest security upgrade to the OPM site
Current Issue
E-Commerce Security: What Every Enterprise Needs to Know
The mainstream use of EMV smartcards in the US has experts predicting an increase in online fraud. Organizations will need to look at new tools and processes for building better breach detection and response capabilities.
Flash Poll
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
Join Dark Reading community editor Marilyn Cohodas in a thought-provoking discussion about the evolving role of the CISO.