Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

3/12/2013
12:37 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Open NAC Integrates With All BYOD Solutions

Bradford Networks launches Network Sentry SmartEdge Platform

Cambridge, MA, March 12, 2013-- Bradford Networks&trade, the best choice to enable secure network access for corporate issued and personal mobile devices, today launched the Network Sentry SmartEdge Platform&trade. This new open platform enables industry-leading security, mobility management, and wired/wireless vendors to integrate with Bradford Networks' award-winning network access control (NAC) solution, Network Sentry, to deliver complete and secure solutions for bring-your-own-device (BYOD).

The Network Sentry SmartEdge platform provides an open Application Programmer Interface (API) that enables bi-directional communication to and from Network Sentry, to extend and enhance visibility, control and remediation out to the very edge of customers' networks. Network Sentry is used by more than 900 customers, and is a core enabling technology for BYOD through its ability to detect every network connection and then provision network access based on the risk posture and profile of each unique user and device.

The Network Sentry SmartEdge Platform provides the foundation for an integrated BYOD ecosystem that comprises leading security, mobility management and wired/wireless infrastructure vendor solutions together with NAC. By utilizing the platform, leading industry BYOD solutions will:

· Reduce BYOD Risk: Provide complete, integrated solution offerings that can be easily and seamlessly tailored to address customers' specific BYOD strategies, challenges and infrastructures.

· Improve Security: Provide proactive and rapid detection and isolation of infected, compromised or non-compliant devices from the network.

· Provide Freedom of Choice: Give customers the flexibility to utilize a wide range of innovative solutions for BYOD, and enable them to maximize their ROI in existing infrastructure.

· Enhance Value: Quickly and easily enhance the value of existing vendor solutions by extending visibility and control over any device – whether personally or corporate owned – that attempts to connect to the network.

Leading security, mobility management and wired/wireless infrastructure vendor solutions are utilizing the

Network Sentry SmartEdge Platform to integrate with Network Sentry:

Security Solutions: The integration enables the correlation of user, device and location information with an infected device's IP address to identify and immediately isolate affected devices at the network edge and enforce remediation policies to mitigate risk. Current and planned integrations include: IBM/Q1Labs, HP/ArcSight, IBM/BigFix, Check Point, Corero, FireEye, Fortinet, HP TippingPoint, Lancope, LogRhythm, Lumension, Intel/McAfee, Palo Alto Networks, RSA, Stonesoft, Dell/SonicWall, Sourcefire, and Symantec.

Mobility Management Solutions: The integration enables companies to ensure the integrity and secure configuration of endpoint devices while securing network access to resources based on pre-established access policies. Current and planned integrations include: AirWatch, Good, SAP/Sybase, and MobileIron.

Wired and Wireless Infrastructure Solutions: The integration enables easy connectivity for personal and corporate devices on the network, while ensuring safe access to corporate assets based on pre-defined policies. Current and planned integrations include: Alcatel-Lucent, Avaya, Aerohive Networks, Aruba Networks, Brocade, Cisco, Dell, Enterasys, Extreme Networks, HP, Juniper Networks, Meru Networks, Motorola, Ruckus Wireless, and Xirrus.

Supporting Quotes

"Embracing a BYOD strategy requires a comprehensive approach to safe enablement of applications. The Network Sentry SmartEdge Platform enables us to leverage critical information regarding personally owned devices, such as laptops, tablets, and smartphones, into the Palo Alto Networks Next-Generation Firewalls and then apply granular security policies to these devices to mitigate potential threats at the very edge of our customers' networks."

- Chad Kinzelberg, senior vice president of Business and Corporate Development at Palo Alto Networks.

"BYOD introduces a whole new set of devices on networks, challenging IT departments who need to ensure the security of both corporate-issued and personally-owned mobile devices. As the leading provider of enterprise mobile management solutions, it's important for us to integrate with other BYOD ecosystem partners in order to provide holistic solutions for BYOD. Through the Network Sentry Smart Edge Platform, we can now integrate network access control with our mobile device management solution to ensure network security together with device integrity at the edge of the network."

- Kevin Keith, director of business development at AirWatch.

"The explosive demand for BYOD means that wireless networks must now support a barrage of personal mobile devices and application traffic. As a leading provider of high-performance wireless networks, we take a 360-degree view of the BYOD challenge in order to address the performance, control and security challenges our customers are facing when deploying BYOD solutions. The Network Sentry SmartEdge Platform enables us to optimize our BYOD offering to support enhanced network access control capabilities that will give our customers complete visibility and control over all mobile devices accessing their high-performance Xirrus wireless networks."

- Steven Wastie, Chief Marketing Officer at Xirrus, Inc.

"ESG research indicates that CISOs want a more integrated security architecture and are looking for more extensive monitoring and command-and-control to address growing security challenges. The open architecture of the Bradford Networks SmartEdge Platform enables easy integration with the leading security, mobility, wired and wireless vendors. The combination of NAC and leading BYOD solutions addresses the enterprise requirements for greater visibility and control."

- Jon Oltsik, senior principal analyst for Enterprise Strategy Group

"With the explosion of BYOD, companies today are not just looking for visibility into what's on and what's accessing their networks, they are now demanding solutions that can take action to preempt and remediate unauthorized access, cyber attacks as well as compromised or non-compliant devices. The new Network Sentry SmartEdge Platform provides a common language for all BYOD ecosystem solution providers, enabling them to create a complete solution for their customers that provides visibility, control and remediation at the edge of the network that ultimately enables secure BYOD."

- Dan Haley, CEO at Bradford Networks.

The Network Sentry SmartEdge Platform API is currently available with Version 6.0 of Network Sentry.

About Bradford Networks

Bradford Networks offers the best solution to enable secure network access for corporate issued and personal mobile devices. The company's flexible Network Sentry solution is the first network security offering that can automatically identify all devices and all users on a network, providing complete visibility and control. Unlike vendor-specific network security products, Network Sentry provides a view across all brands of network equipment and connecting devices eliminating the network blind spots that can introduce risk. Network Sentry is now used by more than 900 enterprise customers worldwide in markets such as healthcare, financial services, retail, government, education and more. For more information, please visit www.bradfordnetworks.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Data Leak Week: Billions of Sensitive Files Exposed Online
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/10/2019
Intel Issues Fix for 'Plundervolt' SGX Flaw
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/11/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-5252
PUBLISHED: 2019-12-14
There is an improper authentication vulnerability in Huawei smartphones (Y9, Honor 8X, Honor 9 Lite, Honor 9i, Y6 Pro). The applock does not perform a sufficient authentication in a rare condition. Successful exploit could allow the attacker to use the application locked by applock in an instant.
CVE-2019-5235
PUBLISHED: 2019-12-14
Some Huawei smart phones have a null pointer dereference vulnerability. An attacker crafts specific packets and sends to the affected product to exploit this vulnerability. Successful exploitation may cause the affected phone to be abnormal.
CVE-2019-5264
PUBLISHED: 2019-12-13
There is an information disclosure vulnerability in certain Huawei smartphones (Mate 10;Mate 10 Pro;Honor V10;Changxiang 7S;P-smart;Changxiang 8 Plus;Y9 2018;Honor 9 Lite;Honor 9i;Mate 9). The software does not properly handle certain information of applications locked by applock in a rare condition...
CVE-2019-5277
PUBLISHED: 2019-12-13
Huawei CloudUSM-EUA V600R006C10;V600R019C00 have an information leak vulnerability. Due to improper configuration, the attacker may cause information leak by successful exploitation.
CVE-2019-5254
PUBLISHED: 2019-12-13
Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have an out-of-bounds read vulnerability. An attacker who logs in to the board m...