Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

3/12/2013
12:37 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Open NAC Integrates With All BYOD Solutions

Bradford Networks launches Network Sentry SmartEdge Platform

Cambridge, MA, March 12, 2013-- Bradford Networks&trade, the best choice to enable secure network access for corporate issued and personal mobile devices, today launched the Network Sentry SmartEdge Platform&trade. This new open platform enables industry-leading security, mobility management, and wired/wireless vendors to integrate with Bradford Networks' award-winning network access control (NAC) solution, Network Sentry, to deliver complete and secure solutions for bring-your-own-device (BYOD).

The Network Sentry SmartEdge platform provides an open Application Programmer Interface (API) that enables bi-directional communication to and from Network Sentry, to extend and enhance visibility, control and remediation out to the very edge of customers' networks. Network Sentry is used by more than 900 customers, and is a core enabling technology for BYOD through its ability to detect every network connection and then provision network access based on the risk posture and profile of each unique user and device.

The Network Sentry SmartEdge Platform provides the foundation for an integrated BYOD ecosystem that comprises leading security, mobility management and wired/wireless infrastructure vendor solutions together with NAC. By utilizing the platform, leading industry BYOD solutions will:

· Reduce BYOD Risk: Provide complete, integrated solution offerings that can be easily and seamlessly tailored to address customers' specific BYOD strategies, challenges and infrastructures.

· Improve Security: Provide proactive and rapid detection and isolation of infected, compromised or non-compliant devices from the network.

· Provide Freedom of Choice: Give customers the flexibility to utilize a wide range of innovative solutions for BYOD, and enable them to maximize their ROI in existing infrastructure.

· Enhance Value: Quickly and easily enhance the value of existing vendor solutions by extending visibility and control over any device – whether personally or corporate owned – that attempts to connect to the network.

Leading security, mobility management and wired/wireless infrastructure vendor solutions are utilizing the

Network Sentry SmartEdge Platform to integrate with Network Sentry:

Security Solutions: The integration enables the correlation of user, device and location information with an infected device's IP address to identify and immediately isolate affected devices at the network edge and enforce remediation policies to mitigate risk. Current and planned integrations include: IBM/Q1Labs, HP/ArcSight, IBM/BigFix, Check Point, Corero, FireEye, Fortinet, HP TippingPoint, Lancope, LogRhythm, Lumension, Intel/McAfee, Palo Alto Networks, RSA, Stonesoft, Dell/SonicWall, Sourcefire, and Symantec.

Mobility Management Solutions: The integration enables companies to ensure the integrity and secure configuration of endpoint devices while securing network access to resources based on pre-established access policies. Current and planned integrations include: AirWatch, Good, SAP/Sybase, and MobileIron.

Wired and Wireless Infrastructure Solutions: The integration enables easy connectivity for personal and corporate devices on the network, while ensuring safe access to corporate assets based on pre-defined policies. Current and planned integrations include: Alcatel-Lucent, Avaya, Aerohive Networks, Aruba Networks, Brocade, Cisco, Dell, Enterasys, Extreme Networks, HP, Juniper Networks, Meru Networks, Motorola, Ruckus Wireless, and Xirrus.

Supporting Quotes

"Embracing a BYOD strategy requires a comprehensive approach to safe enablement of applications. The Network Sentry SmartEdge Platform enables us to leverage critical information regarding personally owned devices, such as laptops, tablets, and smartphones, into the Palo Alto Networks Next-Generation Firewalls and then apply granular security policies to these devices to mitigate potential threats at the very edge of our customers' networks."

- Chad Kinzelberg, senior vice president of Business and Corporate Development at Palo Alto Networks.

"BYOD introduces a whole new set of devices on networks, challenging IT departments who need to ensure the security of both corporate-issued and personally-owned mobile devices. As the leading provider of enterprise mobile management solutions, it's important for us to integrate with other BYOD ecosystem partners in order to provide holistic solutions for BYOD. Through the Network Sentry Smart Edge Platform, we can now integrate network access control with our mobile device management solution to ensure network security together with device integrity at the edge of the network."

- Kevin Keith, director of business development at AirWatch.

"The explosive demand for BYOD means that wireless networks must now support a barrage of personal mobile devices and application traffic. As a leading provider of high-performance wireless networks, we take a 360-degree view of the BYOD challenge in order to address the performance, control and security challenges our customers are facing when deploying BYOD solutions. The Network Sentry SmartEdge Platform enables us to optimize our BYOD offering to support enhanced network access control capabilities that will give our customers complete visibility and control over all mobile devices accessing their high-performance Xirrus wireless networks."

- Steven Wastie, Chief Marketing Officer at Xirrus, Inc.

"ESG research indicates that CISOs want a more integrated security architecture and are looking for more extensive monitoring and command-and-control to address growing security challenges. The open architecture of the Bradford Networks SmartEdge Platform enables easy integration with the leading security, mobility, wired and wireless vendors. The combination of NAC and leading BYOD solutions addresses the enterprise requirements for greater visibility and control."

- Jon Oltsik, senior principal analyst for Enterprise Strategy Group

"With the explosion of BYOD, companies today are not just looking for visibility into what's on and what's accessing their networks, they are now demanding solutions that can take action to preempt and remediate unauthorized access, cyber attacks as well as compromised or non-compliant devices. The new Network Sentry SmartEdge Platform provides a common language for all BYOD ecosystem solution providers, enabling them to create a complete solution for their customers that provides visibility, control and remediation at the edge of the network that ultimately enables secure BYOD."

- Dan Haley, CEO at Bradford Networks.

The Network Sentry SmartEdge Platform API is currently available with Version 6.0 of Network Sentry.

About Bradford Networks

Bradford Networks offers the best solution to enable secure network access for corporate issued and personal mobile devices. The company's flexible Network Sentry solution is the first network security offering that can automatically identify all devices and all users on a network, providing complete visibility and control. Unlike vendor-specific network security products, Network Sentry provides a view across all brands of network equipment and connecting devices eliminating the network blind spots that can introduce risk. Network Sentry is now used by more than 900 enterprise customers worldwide in markets such as healthcare, financial services, retail, government, education and more. For more information, please visit www.bradfordnetworks.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
7 Tips for Infosec Pros Considering A Lateral Career Move
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2020
For Mismanaged SOCs, The Price Is Not Right
Kelly Sheridan, Staff Editor, Dark Reading,  1/22/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
IT 2020: A Look Ahead
Are you ready for the critical changes that will occur in 2020? We've compiled editor insights from the best of our network (Dark Reading, Data Center Knowledge, InformationWeek, ITPro Today and Network Computing) to deliver to you a look at the trends, technologies, and threats that are emerging in the coming year. Download it today!
Flash Poll
How Enterprises are Attacking the Cybersecurity Problem
How Enterprises are Attacking the Cybersecurity Problem
Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. Read this report to find out what your peers biggest security challenges are and the technologies they are using to address them.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-3154
PUBLISHED: 2020-01-27
CRLF injection vulnerability in Zend\Mail (Zend_Mail) in Zend Framework before 1.12.12, 2.x before 2.3.8, and 2.4.x before 2.4.1 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via CRLF sequences in the header of an email.
CVE-2019-17190
PUBLISHED: 2020-01-27
A Local Privilege Escalation issue was discovered in Avast Secure Browser 76.0.1659.101. The vulnerability is due to an insecure ACL set by the AvastBrowserUpdate.exe (which is running as NT AUTHORITY\SYSTEM) when AvastSecureBrowser.exe checks for new updates. When the update check is triggered, the...
CVE-2014-8161
PUBLISHED: 2020-01-27
PostgreSQL before 9.0.19, 9.1.x before 9.1.15, 9.2.x before 9.2.10, 9.3.x before 9.3.6, and 9.4.x before 9.4.1 allows remote authenticated users to obtain sensitive column values by triggering constraint violation and then reading the error message.
CVE-2014-9481
PUBLISHED: 2020-01-27
The Scribunto extension for MediaWiki allows remote attackers to obtain the rollback token and possibly other sensitive information via a crafted module, related to unstripping special page HTML.
CVE-2015-0241
PUBLISHED: 2020-01-27
The to_char function in PostgreSQL before 9.0.19, 9.1.x before 9.1.15, 9.2.x before 9.2.10, 9.3.x before 9.3.6, and 9.4.x before 9.4.1 allows remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a (1) large number of digits when processing a numeric ...