Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


10:38 AM
Dark Reading
Dark Reading
Products and Releases

Enterasys Reports Increased Network Access Control Revenue

Year-over-year revenue for Enterasys Network Access Control (NAC) solution grows by 317%, according to company

Andover, Mass. "June 29, 2009 "Enterasys, the network infrastructure and security division of Siemens Enterprise Communications Group, today announced that it has grown its year-over-year revenues for the Enterasys Network Access Control (NAC) solution by 317%. The increased demand for Enterasys NAC signifies that companies worldwide are investing in the security delivered by NAC technology, but they are also in need of a cost-effective, easily manageable solution for enterprise users, guests and contractors.

"With Enterasys NAC, we get strong security and granular control over who has access, when and from where," said Tom Domenico, director of IT Operations at Massport, the owner and operator of Boston Logan Airport. "We selected Enterasys NAC for this granular visibility and control, and have written policies to permit, deny, prioritize, rate-limit, tag, re-direct and audit network traffic based on user identity, time, location and device type."

Enterasys saw its NAC customer base double over the last year, in an economy where overall IT spending took a global downturn. The Enterasys open-architecture approach to NAC enables it to work in multi-vendor infrastructures, allowing enterprise users to leverage their existing networking investments. While other vendors require comprehensive system upgrades to implement NAC, the Enterasys NAC solution works with third-party switches, routers and wireless access points, multiple assessment servers, authentication servers and security software agents—giving users the freedom to implement a more cost-effective system without sacrificing security.

"In higher education, we are, more than ever, aware of the consequences of inadvertently releasing restricted information regarding both students and staff," said James Pardonek, senior network administrator at Purdue University Calumet. "Enterasys NAC is an integral component of our security strategy, enabling us to proactively manage any guest, device, or trusted user who connects to our network, and what they are authorized to do once connected. Enterasys NAC helps Purdue University Calumet address our compliance requirements with continual enforcement of our network usage and security policies, any time the end system is connected to our network."

Enterasys NAC 3.2, available within 30 days from authorized Enterasys distributors and value added resellers worldwide, provides industry-leading functionality and includes extensive configuration options for fine grained identity-based control, tighter security, enhanced LDAP integration, new guest/system registration functionality, and IT workflow integration.

About Enterasys Networks Enterasys is the network infrastructure and security division of Siemens Enterprise Communications Group, a Gores Group company. Enterasys' network switching, routing and security solutions are used by thousands of customers in more than 70 countries worldwide to deliver business-oriented, identity-based visibility and control for voice, video, and data applications. The company's open-architecture solutions enable easy to deploy role-based access controls and prioritization for wired and wireless environments with integrated management and security that deliver investment protection, operational efficiency, and significantly reduced total cost of ownership. The Enterasys culture is centered on the principle "There is nothing more important than our customers" with industry-leading technical support. More information about Enterasys hardware, software, services and training is available at www.enterasys.com.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
The Cold Truth about Cyber Insurance
Chris Kennedy, CISO & VP Customer Success, AttackIQ,  11/7/2019
Black Hat Q&A: Hacking a '90s Sports Car
Black Hat Staff, ,  11/7/2019
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-11-13
P20 Pro, P20, Mate RS smartphones with versions earlier than Charlotte-AL00A, versions earlier than Emily-AL00A, versions earlier than NEO-AL00D NEO-AL00 have an improper validation vulnerability. The system does not perform...
PUBLISHED: 2019-11-13
P30 smartphones with versions earlier than ELLE-AL00B have an improper authorization vulnerability. The software incorrectly performs an authorization check when a user attempts to perform certain action. Successful exploit could allow the attacker to update a crafted package.
PUBLISHED: 2019-11-13
Huawei smartphones with versions earlier than Taurus-AL00B have an improper authentication vulnerability. Successful exploitation may cause the attacker to access specific components.
PUBLISHED: 2019-11-13
Smartphones with software of ELLE-AL00B,,,,,, have an insufficient verification vulnerability. The system does not verify certain par...
PUBLISHED: 2019-11-12
mysql-gui-tools (mysql-query-browser and mysql-admin) before 5.0r14+openSUSE-2.3 exposes the password of a user connected to the MySQL server in clear text form via the list of running processes.