Lockdown Upgrades Enforcer
Lockdown Networks expands security interoperability and boosts performance
SEATTLE -- Lockdown Networks®, the leading provider of Network Access Control (NAC) solutions that ensure all users and devices on the network comply with security policies, today announced that its flagship Lockdown Enforcer™ solution now delivers enhanced post-connect integration with a broad spectrum of third-party security and network infrastructure technologies. Lockdown Enforcer can incorporate security events into NAC policy from any system that outputs syslog notifications or supports web services, including intrusion detection systems (IDS), intrusion prevention systems (IPS) and network behavioral analysis (NBA). Other new features include a refined policy interface and expanded policy library; additional remediation resources; and support for 802.11 wireless solutions from Aruba Networks, Meru Networks and Trapeze Networks.
Because there is no security silver bullet to safeguard against all network threats, enterprises typically deploy a collection of security technologies that can be quite effective but may not interoperate to optimize network security. Lockdown Enforcer addresses this issue by providing a simple and effective way for security events to drive NAC-based policy actions. This enhanced integration adds immediate value to non-NAC security infrastructure and allows organizations to increase the ROI of their existing network security investments, while realizing more powerful and effective network access control.
“Lockdown Enforcer has proved to be a valuable policy enforcement tool for our customers, particularly as devices connect to the network,” said Jeff Kowalski, chief operations officer of South Seas Corporation, a Littleton, Colorado-based reseller. “With this enhanced integration, our customers can take automated policy enforcement one step further by taking real-time action on events reported by existing IDS and IPS systems. As an added benefit, Enforcer offers the flexibility to add devices to the network without requiring extensive network infrastructure upgrades.”
About the Author
You May Also Like
A Cyber Pros' Guide to Navigating Emerging Privacy Regulation
Dec 10, 2024Identifying the Cybersecurity Metrics that Actually Matter
Dec 11, 2024The Current State of AI Adoption in Cybersecurity, Including its Opportunities
Dec 12, 2024Cybersecurity Day: How to Automate Security Analytics with AI and ML
Dec 17, 2024The Dirt on ROT Data
Dec 18, 2024