ConSentry Adds Security Policy to Switches
ConSentry delivers integrated user and application control to LAN access edge with intelligent Switching architecture
MILPITAS, Calif. -- Bringing disruptive innovation to the LAN access edge, ConSentry® Networks today introduced its Intelligent Switching architecture, a breakthrough in user and application control implemented through a new release of the field-proven ConSentry LANShield™ Switch. Deployed in the wiring closet for the tightest control, Intelligent Switching integrates user, role, and application knowledge with a programmable, wire-speed switching platform to allow IT to bring business context into the LAN, dramatically simplify deployment and operations, and keep pace with evolving business requirements.
The following new LANShield Switch features provide support for Intelligent Switching in the LAN:
Application-based quality of service (QoS) at Layer 7
Increased control of Web-based applications and instant messaging (IM)
Complete LAN visibility by user, role, server, and file
Automatic device and role discovery, drawing from existing identity stores
New security and policy features to protect against MAC spoofing and avoid static IP address mapping of web destinations
ConSentry customer Adaptec (NASDAQ:ADPT) has standardised on ConSentry’s Intelligent Switching to replace existing Cisco access switches across its global operations. “The value of having this degree of user and application intelligence integrated into our wiring closet switch is key,” said Lou Owayni, global network and telecom manager at Adaptec. “With LANShield, when new users are placed in Active Directory, I can safely and automatically add them to the LAN and implement access controls with a single touch. This simple deployment improves efficiency and reduces our TCO tremendously. We also can automatically track where users go and what resources they need to perform their roles, which helps me better manage application performance and develop policies that map to real business practices.”
About the Author
You May Also Like
Cybersecurity Day: How to Automate Security Analytics with AI and ML
Dec 17, 2024The Dirt on ROT Data
Dec 18, 2024