Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


12:37 PM
Dark Reading
Dark Reading
Products and Releases

Open NAC Integrates With All BYOD Solutions

Bradford Networks launches Network Sentry SmartEdge Platform

Cambridge, MA, March 12, 2013-- Bradford Networks&trade, the best choice to enable secure network access for corporate issued and personal mobile devices, today launched the Network Sentry SmartEdge Platform&trade. This new open platform enables industry-leading security, mobility management, and wired/wireless vendors to integrate with Bradford Networks' award-winning network access control (NAC) solution, Network Sentry, to deliver complete and secure solutions for bring-your-own-device (BYOD).

The Network Sentry SmartEdge platform provides an open Application Programmer Interface (API) that enables bi-directional communication to and from Network Sentry, to extend and enhance visibility, control and remediation out to the very edge of customers' networks. Network Sentry is used by more than 900 customers, and is a core enabling technology for BYOD through its ability to detect every network connection and then provision network access based on the risk posture and profile of each unique user and device.

The Network Sentry SmartEdge Platform provides the foundation for an integrated BYOD ecosystem that comprises leading security, mobility management and wired/wireless infrastructure vendor solutions together with NAC. By utilizing the platform, leading industry BYOD solutions will:

· Reduce BYOD Risk: Provide complete, integrated solution offerings that can be easily and seamlessly tailored to address customers' specific BYOD strategies, challenges and infrastructures.

· Improve Security: Provide proactive and rapid detection and isolation of infected, compromised or non-compliant devices from the network.

· Provide Freedom of Choice: Give customers the flexibility to utilize a wide range of innovative solutions for BYOD, and enable them to maximize their ROI in existing infrastructure.

· Enhance Value: Quickly and easily enhance the value of existing vendor solutions by extending visibility and control over any device – whether personally or corporate owned – that attempts to connect to the network.

Leading security, mobility management and wired/wireless infrastructure vendor solutions are utilizing the

Network Sentry SmartEdge Platform to integrate with Network Sentry:

Security Solutions: The integration enables the correlation of user, device and location information with an infected device's IP address to identify and immediately isolate affected devices at the network edge and enforce remediation policies to mitigate risk. Current and planned integrations include: IBM/Q1Labs, HP/ArcSight, IBM/BigFix, Check Point, Corero, FireEye, Fortinet, HP TippingPoint, Lancope, LogRhythm, Lumension, Intel/McAfee, Palo Alto Networks, RSA, Stonesoft, Dell/SonicWall, Sourcefire, and Symantec.

Mobility Management Solutions: The integration enables companies to ensure the integrity and secure configuration of endpoint devices while securing network access to resources based on pre-established access policies. Current and planned integrations include: AirWatch, Good, SAP/Sybase, and MobileIron.

Wired and Wireless Infrastructure Solutions: The integration enables easy connectivity for personal and corporate devices on the network, while ensuring safe access to corporate assets based on pre-defined policies. Current and planned integrations include: Alcatel-Lucent, Avaya, Aerohive Networks, Aruba Networks, Brocade, Cisco, Dell, Enterasys, Extreme Networks, HP, Juniper Networks, Meru Networks, Motorola, Ruckus Wireless, and Xirrus.

Supporting Quotes

"Embracing a BYOD strategy requires a comprehensive approach to safe enablement of applications. The Network Sentry SmartEdge Platform enables us to leverage critical information regarding personally owned devices, such as laptops, tablets, and smartphones, into the Palo Alto Networks Next-Generation Firewalls and then apply granular security policies to these devices to mitigate potential threats at the very edge of our customers' networks."

- Chad Kinzelberg, senior vice president of Business and Corporate Development at Palo Alto Networks.

"BYOD introduces a whole new set of devices on networks, challenging IT departments who need to ensure the security of both corporate-issued and personally-owned mobile devices. As the leading provider of enterprise mobile management solutions, it's important for us to integrate with other BYOD ecosystem partners in order to provide holistic solutions for BYOD. Through the Network Sentry Smart Edge Platform, we can now integrate network access control with our mobile device management solution to ensure network security together with device integrity at the edge of the network."

- Kevin Keith, director of business development at AirWatch.

"The explosive demand for BYOD means that wireless networks must now support a barrage of personal mobile devices and application traffic. As a leading provider of high-performance wireless networks, we take a 360-degree view of the BYOD challenge in order to address the performance, control and security challenges our customers are facing when deploying BYOD solutions. The Network Sentry SmartEdge Platform enables us to optimize our BYOD offering to support enhanced network access control capabilities that will give our customers complete visibility and control over all mobile devices accessing their high-performance Xirrus wireless networks."

- Steven Wastie, Chief Marketing Officer at Xirrus, Inc.

"ESG research indicates that CISOs want a more integrated security architecture and are looking for more extensive monitoring and command-and-control to address growing security challenges. The open architecture of the Bradford Networks SmartEdge Platform enables easy integration with the leading security, mobility, wired and wireless vendors. The combination of NAC and leading BYOD solutions addresses the enterprise requirements for greater visibility and control."

- Jon Oltsik, senior principal analyst for Enterprise Strategy Group

"With the explosion of BYOD, companies today are not just looking for visibility into what's on and what's accessing their networks, they are now demanding solutions that can take action to preempt and remediate unauthorized access, cyber attacks as well as compromised or non-compliant devices. The new Network Sentry SmartEdge Platform provides a common language for all BYOD ecosystem solution providers, enabling them to create a complete solution for their customers that provides visibility, control and remediation at the edge of the network that ultimately enables secure BYOD."

- Dan Haley, CEO at Bradford Networks.

The Network Sentry SmartEdge Platform API is currently available with Version 6.0 of Network Sentry.

About Bradford Networks

Bradford Networks offers the best solution to enable secure network access for corporate issued and personal mobile devices. The company's flexible Network Sentry solution is the first network security offering that can automatically identify all devices and all users on a network, providing complete visibility and control. Unlike vendor-specific network security products, Network Sentry provides a view across all brands of network equipment and connecting devices eliminating the network blind spots that can introduce risk. Network Sentry is now used by more than 900 enterprise customers worldwide in markets such as healthcare, financial services, retail, government, education and more. For more information, please visit www.bradfordnetworks.com.

Comment  | 
Print  | 
More Insights
Threaded  |  Newest First  |  Oldest First
Mobile Banking Malware Up 50% in First Half of 2019
Kelly Sheridan, Staff Editor, Dark Reading,  1/17/2020
Exploits Released for As-Yet Unpatched Critical Citrix Flaw
Jai Vijayan, Contributing Writer,  1/13/2020
Microsoft to Officially End Support for Windows 7, Server 2008
Kelly Sheridan, Staff Editor, Dark Reading,  1/13/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
[Just Released] How Enterprises are Attacking the Cybersecurity Problem
[Just Released] How Enterprises are Attacking the Cybersecurity Problem
Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. Read this report to find out what your peers biggest security challenges are and the technologies they are using to address them.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-01-18
Westermo MRD-315 1.7.3 and 1.7.4 devices have an information disclosure vulnerability that allows an authenticated remote attacker to retrieve the source code of different functions of the web application via requests that lack certain mandatory parameters. This affects ifaces-diag.asp, system.asp, ...
PUBLISHED: 2020-01-18
A memory usage vulnerability exists in Trend Micro Password Manager 3.8 that could allow an attacker with access and permissions to the victim's memory processes to extract sensitive information.
PUBLISHED: 2020-01-18
A RootCA vulnerability found in Trend Micro Password Manager for Windows and macOS exists where the localhost.key of RootCA.crt might be improperly accessed by an unauthorized party and could be used to create malicious self-signed SSL certificates, allowing an attacker to misdirect a user to phishi...
PUBLISHED: 2020-01-18
An arbitrary code execution vulnerability exists in the Trend Micro Security 2019 (v15) consumer family of products which could allow an attacker to gain elevated privileges and tamper with protected services by disabling or otherwise preventing them to start. An attacker must already have administr...
PUBLISHED: 2020-01-18
A Persistent Arbitrary Code Execution vulnerability exists in the Trend Micro Security 2020 (v160 and 2019 (v15) consumer familiy of products which could potentially allow an attacker the ability to create a malicious program to escalate privileges and attain persistence on a vulnerable system.