Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

4/30/2006
11:45 AM
50%
50%

Identity Engines Has NAC Solution

Ignition v3.0 includes dynamic network session provisioning and integrated guest access management

MOUNTAIN VIEW, Calif. -- Identity Engines, Inc., a leading provider of network-based identity management solutions, today announced Ignition™ v3.0. The new release is the first and only comprehensive network access solution to include dynamic network session provisioning and integrated guest access management. With Ignition v3.0, organizations can now dynamically adjust network security and access control in real-time based on the user identity. Additional new features with this release include support for strong authentication, enhanced monitoring and reporting, new protocol types and automated configuration tools.

As organizations evolve to support the demand for greater mobile and remote connectivity it has become increasingly difficult for IT departments to ensure consistent and secure access across all network entry points. Ignition simplifies the management of network access control by tightly integrating existing directories with network infrastructure—eliminating the need to support individual repositories for each network access type. Ignition helps to better protect enterprise resources through an identity- and policy-based security model which is gaining momentum in today’s leading enterprise environments.

“We looked at a variety of identity management solutions to help us control network access,” said Chia-Chee Kuan, CTO and VP Engineering of AirMagnet. “We selected the Identity Engines Ignition platform because it allows us to control access for our employees, contractors and guests by leveraging network and directory infrastructure we already had in place. The concept of creating a comprehensive identity-based access-control overlay with a quick appliance-based deployment was most appealing to us.”

Ignition v3.0 provides an unprecedented level of control by unlocking existing under-utilized features in network and security devices while enabling dynamic network session provisioning—making networks easier to manage. Ignition turns previously passive network switches into intelligent identity-aware access-control devices that can actively place users into different network partitions, with different access rights, based on user identity information. These new identity-based provisioning capabilities enable fine-grained control over parameters controlling network segmentation, QoS, and ACLs based on the user requesting access. Additionally, Ignition’s dynamic network access provisioning is vendor-neutral, working with all major networking and security equipment that support the IETF-standard RADIUS protocol, including vendor proprietary extensions.

In addition to identity-based dynamic network access provisioning, Ignition v3.0 includes:

  • Ignition Jumpstart™: a new application designed for enterprise guest and temporary user management that allows companies to lock down open ports in conference rooms and manage secure access to wireless LANs for guests and visitors. Jumpstart is the only application that can manage guest access across wired, wireless, and VPN access points.

  • Ignition Live View™ Monitoring and Auditing: offering compliance reporting of all network access activities via the Ignition centralized network AAA resulting in improved security and regulatory compliance.

  • On-demand data integration of multiple LDAP and Active Directory servers via Ignition: offering easy integration with existing directory and identity systems to allow Ignition to work with the data schema and content that exists today in most organizations. Also leverages identity data, wherever it resides, for determining network level access control.

The new release for Ignition also includes enterprise manageability enhancements ensuring higher system availability, support for EAP-TLS and PEAP-TLS which offers additional secure options for host to network security and encryption, and support for RSA SecurID offering strong authentication capabilities. Additionally, Ignition v3.0 includes support for machine authentication and expands directory support offering with Sun Java System Directory Support.

“We built Ignition to address the needs created by today’s business trends, including the increasing complexity of network and application systems brought about by more access points and components, the movement towards a mobile and distributed workforce and the need to maintain regulatory compliance in the face of these changes,” said Richard Bush, CEO. “With the release of v3.0, we’ve executed on our vision of identity-based networking and provided our customers with a powerful product to manage their network access.”

The Ignition Model 3000E appliance with v3.0 software is available now starting at US$15,000. For more information, visit http://www.idengines.com/products or contact [email protected]

Identity Engines Inc.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Commentary
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-20001
PUBLISHED: 2021-04-11
In the standard library in Rust before 1.2.0, BinaryHeap is not panic-safe. The binary heap is left in an inconsistent state when the comparison of generic elements inside sift_up or sift_down_range panics. This bug leads to a drop of zeroed memory as an arbitrary type, which can result in a memory ...
CVE-2020-36317
PUBLISHED: 2021-04-11
In the standard library in Rust before 1.49.0, String::retain() function has a panic safety problem. It allows creation of a non-UTF-8 Rust string when the provided closure panics. This bug could result in a memory safety violation when other string APIs assume that UTF-8 encoding is used on the sam...
CVE-2020-36318
PUBLISHED: 2021-04-11
In the standard library in Rust before 1.49.0, VecDeque::make_contiguous has a bug that pops the same element more than once under certain condition. This bug could result in a use-after-free or double free.
CVE-2021-28875
PUBLISHED: 2021-04-11
In the standard library in Rust before 1.50.0, read_to_end() does not validate the return value from Read in an unsafe context. This bug could lead to a buffer overflow.
CVE-2021-28876
PUBLISHED: 2021-04-11
In the standard library in Rust before 1.52.0, the Zip implementation has a panic safety issue. It calls __iterator_get_unchecked() more than once for the same index when the underlying iterator panics (in certain conditions). This bug could lead to a memory safety violation due to an unmet safety r...