contact contact contact
 Advertise
 Contact
 SecurityWatch
  Articles | Editorials | Reviews | News | InfoSec Directory | Releases | White Papers

VoIP Articles - New to VoIP? VoIP Articles will help you understand what's important in VoIP.

StillSecure Launches Most Flexible Network Access Control Solution
Publication date: Monday, 14 November 2005

Safe Access™ v4.0 Offers Three Testing Methods and Four Enforcement Mechanisms to Provide Seamless Integration into Virtually Any Network Environment

(Louisville, Colo. – November 14, 2005) – StillSecure, provider of an award-winning, integrated suite of enterprise network security solutions, today announced StillSecure Safe Access v4.0. Safe Access offers unmatched flexibility and choice with three endpoint testing methods and four policy enforcement methods. These include truly agent-less/client-less, agent- based, and ActiveX testing options; and DHCP, in-line (Gateway), NAC, and 802.1x enforcement options. With multiple, flexible testing and enforcement options, Safe Access seamlessly integrates into virtually any enterprise network and can test and enforce against the complete range of user types (internal LAN, wireless, unmanaged, remote, guest, etc.).

v4.0 includes support for 802.1x, which uses hardware-level policy enforcement to provide one of the most secure methods for quarantining devices. Safe Access leverages 802.1x-compliant switches to control access, placing endpoints on the appropriate VLAN (quarantine VLAN, guest VLAN, production VLAN for example) based on test results. Devices testing compliant are granted access. Non-compliant devices are either quarantined or are given a ‘grace period’ of access. In quarantine, remediation of devices can be accomplished automatically by leveraging Safe Access’ Enterprise Integration Framework (EIF) to integrate with a number of patch management solutions, or users can be directed to resources to “self- remediate” their devices.

Through 802.1x integration, Safe Access can take advantage of “on the fly" dynamic VLAN quarantining. Devices can be quarantined into an unlimited number of VLANs based on the status of their security posture. For example, an infected device can be placed into its own VLAN to minimize the spread of worms, Trojans, and viruses. Similarly, departmental groups (e.g. finance, marketing) can be assigned to a VLAN for departmental access to the network. In addition, 802.1x solves the problem of what to do with guest devices that are unable to supply credentials and cannot be authenticated. These devices can now be placed into their own VLAN for restricted network access.

“Safe Access is a rapidly maturing network access control product and the v4.0 release further expands end user options for flexible testing and enforcement,” said Andrew Braunberg, Senior Analyst at Current Analysis.

“With v4.0, all testing methods work with all enforcement methods which enables Safe Access to control network access for the full range of user types – including trusted and untrusted, foreign and internal, remote, and wireless endpoints.”

“Safe Access uses a purpose-built network access control engine to provide a highly scalable, flexible endpoint security product that can test thousand of devices a minute,” said Mitchell Ashley, CTO and VP of Customer Experience at StillSecure. “Safe Access’ multiple testing and enforcement options allow enterprises to secure their networks from all endpoints, regardless of the network topology, configuration, or hardware.”

Also New in Safe Access v4.0:

* Safe Access Enterprise Integration Framework™ patch management connector – Integration with BigFix® and Microsoft SMS is natively supported; additional patch management integrations are in development and available on request.

* Anti-spyware support – Adding to the most comprehensive suite of tests available, Safe Access now tests for the following anti-spyware solutions:
Aluria Software™ Spyware Eliminator, Computer Associates PestPatrol®, Lavasoft Ad-Aware Plus and Ad-Aware Professional, McAfee® Anti-Spyware Enterprise, Microsoft Windows Anti-Spyware, and Sunbelt Software CounterSpy.

* Self remediation – Automatic end-user notification when devices are deficient and the process for remediation.

About Safe Access
Using Safe Access, administrators create Access policies that: (1) define which applications and services are permitted and (2) specify the actions to be taken when devices do not comply. Safe Access automatically applies access policies to devices as they log onto the network. Based on test results, devices are either permitted or denied network access or quarantined to a specific part of the network, thus enforcing organizational security standards.

Pricing and availability
StillSecure Safe Access v4.0 is available now from StillSecure or through any of its authorized resellers. Safe Access is available on an annual, fixed-cost subscription basis or through a purchase-plus-maintenance model based on the number of total users. Both options include all standard security tests and test updates, software upgrades, and engineer-delivered technical support. For a Safe Access trial contact StillSecure sales at .

About StillSecure
StillSecure delivers network security solutions that protect IT business infrastructure. The integrated StillSecure suite provides preventative defense, enables compliance with regulatory information security policies, and actively blocks network attacks. StillSecure manages and reduces risk from network attack and noncompliance for some of the largest organizations in the healthcare, financial services, government, and education sectors.
For more information please call , or visit http://www.stillsecure.com.


Friday, November 25, 2005

Network Security

· How Your ISP Protects You?
· Analyzing Worms using Compression
· Security: Forget the Sheep, Mind the Bears!
· CIOs nervous about IP network security


Scan all company email for viruses, Trojans and worms with 4 virus engines, all in one package - GFI MailSecurity for Exchange/SMTP! Download your free 60-day trial today!

Network Security Software - Sponsored by GFI Network Security.

Check your website security with Acunetix Web Vulnerability Scanner. Audit your web applications for SQL injection, cross site scripting & more. Download trial!


Wireless Security

· Secured Wireless Offers Enterprises More Than Just Peace Of Mind
· Wireless LANs, the new 'secure' network
· WPA-PSK: Step-by-Step
· 10 ways to wireless security

Press Releases

· Senior IT Security Professionals Make It Personal And Take A Step Back From Compliance
· Acunetix Web Vulnerability Scanner Version 3.0 Combats Rise in “Google Hacking” Attacks
· SANS Top 20 List overlooks the people, legal and insurance issues
· "Laws of Vulnerabilities" Research shows progress but reveals two out of three systems still vulnerable
 Copyright © 2000 - 2005 eBCVG IT Security Affiliates :: RSS feeds :: Privacy 
Site Meter