Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


12:37 PM
Dark Reading
Dark Reading
Products and Releases

Open NAC Integrates With All BYOD Solutions

Bradford Networks launches Network Sentry SmartEdge Platform

Cambridge, MA, March 12, 2013-- Bradford Networks&trade, the best choice to enable secure network access for corporate issued and personal mobile devices, today launched the Network Sentry SmartEdge Platform&trade. This new open platform enables industry-leading security, mobility management, and wired/wireless vendors to integrate with Bradford Networks' award-winning network access control (NAC) solution, Network Sentry, to deliver complete and secure solutions for bring-your-own-device (BYOD).

The Network Sentry SmartEdge platform provides an open Application Programmer Interface (API) that enables bi-directional communication to and from Network Sentry, to extend and enhance visibility, control and remediation out to the very edge of customers' networks. Network Sentry is used by more than 900 customers, and is a core enabling technology for BYOD through its ability to detect every network connection and then provision network access based on the risk posture and profile of each unique user and device.

The Network Sentry SmartEdge Platform provides the foundation for an integrated BYOD ecosystem that comprises leading security, mobility management and wired/wireless infrastructure vendor solutions together with NAC. By utilizing the platform, leading industry BYOD solutions will:

· Reduce BYOD Risk: Provide complete, integrated solution offerings that can be easily and seamlessly tailored to address customers' specific BYOD strategies, challenges and infrastructures.

· Improve Security: Provide proactive and rapid detection and isolation of infected, compromised or non-compliant devices from the network.

· Provide Freedom of Choice: Give customers the flexibility to utilize a wide range of innovative solutions for BYOD, and enable them to maximize their ROI in existing infrastructure.

· Enhance Value: Quickly and easily enhance the value of existing vendor solutions by extending visibility and control over any device – whether personally or corporate owned – that attempts to connect to the network.

Leading security, mobility management and wired/wireless infrastructure vendor solutions are utilizing the

Network Sentry SmartEdge Platform to integrate with Network Sentry:

Security Solutions: The integration enables the correlation of user, device and location information with an infected device's IP address to identify and immediately isolate affected devices at the network edge and enforce remediation policies to mitigate risk. Current and planned integrations include: IBM/Q1Labs, HP/ArcSight, IBM/BigFix, Check Point, Corero, FireEye, Fortinet, HP TippingPoint, Lancope, LogRhythm, Lumension, Intel/McAfee, Palo Alto Networks, RSA, Stonesoft, Dell/SonicWall, Sourcefire, and Symantec.

Mobility Management Solutions: The integration enables companies to ensure the integrity and secure configuration of endpoint devices while securing network access to resources based on pre-established access policies. Current and planned integrations include: AirWatch, Good, SAP/Sybase, and MobileIron.

Wired and Wireless Infrastructure Solutions: The integration enables easy connectivity for personal and corporate devices on the network, while ensuring safe access to corporate assets based on pre-defined policies. Current and planned integrations include: Alcatel-Lucent, Avaya, Aerohive Networks, Aruba Networks, Brocade, Cisco, Dell, Enterasys, Extreme Networks, HP, Juniper Networks, Meru Networks, Motorola, Ruckus Wireless, and Xirrus.

Supporting Quotes

"Embracing a BYOD strategy requires a comprehensive approach to safe enablement of applications. The Network Sentry SmartEdge Platform enables us to leverage critical information regarding personally owned devices, such as laptops, tablets, and smartphones, into the Palo Alto Networks Next-Generation Firewalls and then apply granular security policies to these devices to mitigate potential threats at the very edge of our customers' networks."

- Chad Kinzelberg, senior vice president of Business and Corporate Development at Palo Alto Networks.

"BYOD introduces a whole new set of devices on networks, challenging IT departments who need to ensure the security of both corporate-issued and personally-owned mobile devices. As the leading provider of enterprise mobile management solutions, it's important for us to integrate with other BYOD ecosystem partners in order to provide holistic solutions for BYOD. Through the Network Sentry Smart Edge Platform, we can now integrate network access control with our mobile device management solution to ensure network security together with device integrity at the edge of the network."

- Kevin Keith, director of business development at AirWatch.

"The explosive demand for BYOD means that wireless networks must now support a barrage of personal mobile devices and application traffic. As a leading provider of high-performance wireless networks, we take a 360-degree view of the BYOD challenge in order to address the performance, control and security challenges our customers are facing when deploying BYOD solutions. The Network Sentry SmartEdge Platform enables us to optimize our BYOD offering to support enhanced network access control capabilities that will give our customers complete visibility and control over all mobile devices accessing their high-performance Xirrus wireless networks."

- Steven Wastie, Chief Marketing Officer at Xirrus, Inc.

"ESG research indicates that CISOs want a more integrated security architecture and are looking for more extensive monitoring and command-and-control to address growing security challenges. The open architecture of the Bradford Networks SmartEdge Platform enables easy integration with the leading security, mobility, wired and wireless vendors. The combination of NAC and leading BYOD solutions addresses the enterprise requirements for greater visibility and control."

- Jon Oltsik, senior principal analyst for Enterprise Strategy Group

"With the explosion of BYOD, companies today are not just looking for visibility into what's on and what's accessing their networks, they are now demanding solutions that can take action to preempt and remediate unauthorized access, cyber attacks as well as compromised or non-compliant devices. The new Network Sentry SmartEdge Platform provides a common language for all BYOD ecosystem solution providers, enabling them to create a complete solution for their customers that provides visibility, control and remediation at the edge of the network that ultimately enables secure BYOD."

- Dan Haley, CEO at Bradford Networks.

The Network Sentry SmartEdge Platform API is currently available with Version 6.0 of Network Sentry.

About Bradford Networks

Bradford Networks offers the best solution to enable secure network access for corporate issued and personal mobile devices. The company's flexible Network Sentry solution is the first network security offering that can automatically identify all devices and all users on a network, providing complete visibility and control. Unlike vendor-specific network security products, Network Sentry provides a view across all brands of network equipment and connecting devices eliminating the network blind spots that can introduce risk. Network Sentry is now used by more than 900 enterprise customers worldwide in markets such as healthcare, financial services, retail, government, education and more. For more information, please visit www.bradfordnetworks.com.


Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/9/2020
Introducing 'Secure Access Service Edge'
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  7/3/2020
Russian Cyber Gang 'Cosmic Lynx' Focuses on Email Fraud
Kelly Sheridan, Staff Editor, Dark Reading,  7/7/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-07-10
Open redirect vulnerability in SHIRASAGI v1.13.1 and earlier allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.
PUBLISHED: 2020-07-09
An information leak was discovered on Yubico YubiKey 5 NFC devices 5.0.0 to 5.2.6 and 5.3.0 to 5.3.1. The OTP application allows a user to set optional access codes on OTP slots. This access code is intended to prevent unauthorized changes to OTP configurations. The access code is not checked when u...
PUBLISHED: 2020-07-09
In TimelineJS before version 3.7.0, some user data renders as HTML. An attacker could implement an XSS exploit with maliciously crafted content in a number of data fields. This risk is present whether the source data for the timeline is stored on Google Sheets or in a JSON configuration file. Most T...
PUBLISHED: 2020-07-09
The tough library (Rust/crates.io) prior to version 0.7.1 does not properly verify the threshold of cryptographic signatures. It allows an attacker to duplicate a valid signature in order to circumvent TUF requiring a minimum threshold of unique signatures before the metadata is considered valid. A ...
PUBLISHED: 2020-07-09
A reflected Cross-Site Scripting (XSS) Vulnerability in the KingComposer plugin through 2.9.4 for WordPress allows remote attackers to trick a victim into submitting an install_online_preset AJAX request containing base64-encoded JavaScript (in the kc-online-preset-data POST parameter) that is execu...