Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


10:38 AM
Dark Reading
Dark Reading
Products and Releases

Enterasys Reports Increased Network Access Control Revenue

Year-over-year revenue for Enterasys Network Access Control (NAC) solution grows by 317%, according to company

Andover, Mass. "June 29, 2009 "Enterasys, the network infrastructure and security division of Siemens Enterprise Communications Group, today announced that it has grown its year-over-year revenues for the Enterasys Network Access Control (NAC) solution by 317%. The increased demand for Enterasys NAC signifies that companies worldwide are investing in the security delivered by NAC technology, but they are also in need of a cost-effective, easily manageable solution for enterprise users, guests and contractors.

"With Enterasys NAC, we get strong security and granular control over who has access, when and from where," said Tom Domenico, director of IT Operations at Massport, the owner and operator of Boston Logan Airport. "We selected Enterasys NAC for this granular visibility and control, and have written policies to permit, deny, prioritize, rate-limit, tag, re-direct and audit network traffic based on user identity, time, location and device type."

Enterasys saw its NAC customer base double over the last year, in an economy where overall IT spending took a global downturn. The Enterasys open-architecture approach to NAC enables it to work in multi-vendor infrastructures, allowing enterprise users to leverage their existing networking investments. While other vendors require comprehensive system upgrades to implement NAC, the Enterasys NAC solution works with third-party switches, routers and wireless access points, multiple assessment servers, authentication servers and security software agents—giving users the freedom to implement a more cost-effective system without sacrificing security.

"In higher education, we are, more than ever, aware of the consequences of inadvertently releasing restricted information regarding both students and staff," said James Pardonek, senior network administrator at Purdue University Calumet. "Enterasys NAC is an integral component of our security strategy, enabling us to proactively manage any guest, device, or trusted user who connects to our network, and what they are authorized to do once connected. Enterasys NAC helps Purdue University Calumet address our compliance requirements with continual enforcement of our network usage and security policies, any time the end system is connected to our network."

Enterasys NAC 3.2, available within 30 days from authorized Enterasys distributors and value added resellers worldwide, provides industry-leading functionality and includes extensive configuration options for fine grained identity-based control, tighter security, enhanced LDAP integration, new guest/system registration functionality, and IT workflow integration.

About Enterasys Networks Enterasys is the network infrastructure and security division of Siemens Enterprise Communications Group, a Gores Group company. Enterasys' network switching, routing and security solutions are used by thousands of customers in more than 70 countries worldwide to deliver business-oriented, identity-based visibility and control for voice, video, and data applications. The company's open-architecture solutions enable easy to deploy role-based access controls and prioritization for wired and wireless environments with integrated management and security that deliver investment protection, operational efficiency, and significantly reduced total cost of ownership. The Enterasys culture is centered on the principle "There is nothing more important than our customers" with industry-leading technical support. More information about Enterasys hardware, software, services and training is available at www.enterasys.com.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 6/5/2020
How AI and Automation Can Help Bridge the Cybersecurity Talent Gap
Peter Barker, Chief Product Officer at ForgeRock,  6/1/2020
Cybersecurity Spending Hits 'Temporary Pause' Amid Pandemic
Kelly Jackson Higgins, Executive Editor at Dark Reading,  6/2/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: What? IT said I needed virus protection!
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-06-05
The Elementor Page Builder plugin before 2.9.9 for WordPress suffers from a stored XSS vulnerability. An author user can create posts that result in a stored XSS by using a crafted payload in custom links.
PUBLISHED: 2020-06-05
The Elementor Page Builder plugin before 2.9.9 for WordPress suffers from multiple stored XSS vulnerabilities. An author user can create posts that result in stored XSS vulnerabilities, by using a crafted link in the custom URL or by applying custom attributes.
PUBLISHED: 2020-06-05
In Combodo iTop a menu shortcut name can be exploited with a stored XSS payload. This is fixed in all iTop packages (community, essential, professional) in version 2.7.0 and iTop essential and iTop professional in version 2.6.4.
PUBLISHED: 2020-06-05
In Combodo iTop, dashboard ids can be exploited with a reflective XSS payload. This is fixed in all iTop packages (community, essential, professional) for version 2.7.0 and in iTop essential and iTop professional packages for version 2.6.4.
PUBLISHED: 2020-06-05
In the cheetah free wifi 5.1 driver file liebaonat.sys, local users are allowed to cause a denial of service (BSOD) or other unknown impact due to failure to verify the value of a specific IOCTL.