Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


10:38 AM
Dark Reading
Dark Reading
Products and Releases

Enterasys Reports Increased Network Access Control Revenue

Year-over-year revenue for Enterasys Network Access Control (NAC) solution grows by 317%, according to company

Andover, Mass. "June 29, 2009 "Enterasys, the network infrastructure and security division of Siemens Enterprise Communications Group, today announced that it has grown its year-over-year revenues for the Enterasys Network Access Control (NAC) solution by 317%. The increased demand for Enterasys NAC signifies that companies worldwide are investing in the security delivered by NAC technology, but they are also in need of a cost-effective, easily manageable solution for enterprise users, guests and contractors.

"With Enterasys NAC, we get strong security and granular control over who has access, when and from where," said Tom Domenico, director of IT Operations at Massport, the owner and operator of Boston Logan Airport. "We selected Enterasys NAC for this granular visibility and control, and have written policies to permit, deny, prioritize, rate-limit, tag, re-direct and audit network traffic based on user identity, time, location and device type."

Enterasys saw its NAC customer base double over the last year, in an economy where overall IT spending took a global downturn. The Enterasys open-architecture approach to NAC enables it to work in multi-vendor infrastructures, allowing enterprise users to leverage their existing networking investments. While other vendors require comprehensive system upgrades to implement NAC, the Enterasys NAC solution works with third-party switches, routers and wireless access points, multiple assessment servers, authentication servers and security software agents—giving users the freedom to implement a more cost-effective system without sacrificing security.

"In higher education, we are, more than ever, aware of the consequences of inadvertently releasing restricted information regarding both students and staff," said James Pardonek, senior network administrator at Purdue University Calumet. "Enterasys NAC is an integral component of our security strategy, enabling us to proactively manage any guest, device, or trusted user who connects to our network, and what they are authorized to do once connected. Enterasys NAC helps Purdue University Calumet address our compliance requirements with continual enforcement of our network usage and security policies, any time the end system is connected to our network."

Enterasys NAC 3.2, available within 30 days from authorized Enterasys distributors and value added resellers worldwide, provides industry-leading functionality and includes extensive configuration options for fine grained identity-based control, tighter security, enhanced LDAP integration, new guest/system registration functionality, and IT workflow integration.

About Enterasys Networks Enterasys is the network infrastructure and security division of Siemens Enterprise Communications Group, a Gores Group company. Enterasys' network switching, routing and security solutions are used by thousands of customers in more than 70 countries worldwide to deliver business-oriented, identity-based visibility and control for voice, video, and data applications. The company's open-architecture solutions enable easy to deploy role-based access controls and prioritization for wired and wireless environments with integrated management and security that deliver investment protection, operational efficiency, and significantly reduced total cost of ownership. The Enterasys culture is centered on the principle "There is nothing more important than our customers" with industry-leading technical support. More information about Enterasys hardware, software, services and training is available at www.enterasys.com.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Cyberattacks Are Tailored to Employees ... Why Isn't Security Training?
Tim Sadler, CEO and co-founder of Tessian,  6/17/2021
7 Powerful Cybersecurity Skills the Energy Sector Needs Most
Pam Baker, Contributing Writer,  6/22/2021
Microsoft Disrupts Large-Scale BEC Campaign Across Web Services
Kelly Sheridan, Staff Editor, Dark Reading,  6/15/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-06-23
Vulnerability in OpenGrok (component: Web App). Versions that are affected are 1.6.7 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via HTTPS to compromise OpenGrok. Successful attacks of this vulnerability can result in takeover of OpenGrok. CVSS 3.1 ...
PUBLISHED: 2021-06-23
A vulnerability in SonicOS where the HTTP server response leaks partial memory by sending a crafted HTTP request, this can potentially lead to an internal sensitive data disclosure vulnerability.
PUBLISHED: 2021-06-23
A command execution vulnerability exists in the default legacy spellchecker plugin in Moodle 3.10. A specially crafted series of HTTP requests can lead to command execution. An attacker must have administrator privileges to exploit this vulnerabilities.
PUBLISHED: 2021-06-23
Heap based buffer overflow in tsMuxer 2.6.16 allows attackers to cause a Denial of Service (DoS) by running the application with a crafted file.
PUBLISHED: 2021-06-23
Heap based buffer overflow in tsMuxer 2.6.16 allows attackers to cause a Denial of Service (DoS) by running the application with a crafted file.