Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

6/26/2006
01:47 AM
50%
50%

Lockdown Joins Microsoft Program

Lockdown announced the launch of its open iNAC architecture

SEATTLE -- Lockdown Networks®, the leading provider of Network Access Control (NAC) solutions that ensure all users and devices on the network comply with security and IT policies, today announced the launch of its open iNAC® (intelligent NAC) architecture for collaboration and integration with a full spectrum of security, endpoint and network infrastructure technologies. The iNAC architecture creates an extensible NAC policy environment that enables third-party security and network infrastructure products to collaborate in network access policy decisions, and to share information critical to network and endpoint security with the Lockdown Enforcer™. Through collaborative product development, iNAC-enabled applications enhance overall network security, while simultaneously improving the end-user experience and maximizing the value of IT and security investments. Lockdown’s iNAC architecture is used to integrate Lockdown Enforcer with Enterasys Networks intrusion detection technology, PatchLink patch management software, Microsoft NAP and IBM Tivoli, and will be used for integration with Intel vPro Technology.

Lockdown iNAC delivers a universe of interoperability that increases the security of the network, while improving the end-user experience and productivity. iNAC realizes these benefits by sharing data and integrating policies with diverse solutions such as VPN, application access, firewall, patch management, security frameworks, and intrusion protection and detection solutions.

"We selected Lockdown NAC because it would integrate with our existing infrastructure and allows us to control user access to varying security levels," said George Owoc of EADS Astrium North America. "With iNAC, Lockdown's solution looks even better as we will be able to integrate future infrastructure investments. For example, Lockdown's approach could enable us to fully automate remediation processes for non-compliant endpoints, eliminating the time consuming end-user driven remediation process."

Lockdown Networks Inc.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 10/30/2020
6 Ways Passwords Fail Basic Security Tests
Curtis Franklin Jr., Senior Editor at Dark Reading,  10/28/2020
'Act of War' Clause Could Nix Cyber Insurance Payouts
Robert Lemos, Contributing Writer,  10/29/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How to Measure and Reduce Cybersecurity Risk in Your Organization
In this Tech Digest, we examine the difficult practice of measuring cyber-risk that has long been an elusive target for enterprises. Download it today!
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-7759
PUBLISHED: 2020-10-30
The package pimcore/pimcore from 6.7.2 and before 6.8.3 are vulnerable to SQL Injection in data classification functionality in ClassificationstoreController. This can be exploited by sending a specifically-crafted input in the relationIds parameter as demonstrated by the following request: http://v...
CVE-2020-7760
PUBLISHED: 2020-10-30
This affects the package codemirror before 5.58.2; the package org.apache.marmotta.webjars:codemirror before 5.58.2. The vulnerable regular expression is located in https://github.com/codemirror/CodeMirror/blob/cdb228ac736369c685865b122b736cd0d397836c/mode/javascript/javascript.jsL129. The ReDOS vu...
CVE-2020-27014
PUBLISHED: 2020-10-30
Trend Micro Antivirus for Mac 2020 (Consumer) contains a race condition vulnerability in the Web Threat Protection Blocklist component, that if exploited, could allow an attacker to case a kernel panic or crash. An attacker must first obtain the ability to execute high-privileged code on the targ...
CVE-2020-27015
PUBLISHED: 2020-10-30
Trend Micro Antivirus for Mac 2020 (Consumer) contains an Error Message Information Disclosure vulnerability that if exploited, could allow kernel pointers and debug messages to leak to userland. An attacker must first obtain the ability to execute high-privi...
CVE-2020-27885
PUBLISHED: 2020-10-29
Cross-Site Scripting (XSS) vulnerability on WSO2 API Manager 3.1.0. By exploiting a Cross-site scripting vulnerability the attacker can hijack a logged-in user’s session by stealing cookies which means that a malicious hacker can change the logged-in user’s pass...