14 posts categorized "Network Access Control" Feed

Why Invest in a Product that is Built Around a Modular Design? (by George Bouchard)

Why is Modularity important when considering purchasing a network access product? Well, for example, it may not be practical to design a house in a modular fashion, but if it were practical, then you could build your house exactly the way you wanted it for your needs today.  And if you only had the need for two bedrooms today, you could design it that way.  As your family grew, you could then add more bedroom modules to accommodate the growth of your family or your mother-in-law coming to live with you.

Modular Network Access Image 
Modularity gives you flexibility…you only have to purchase what you need today, and you can add or change functionality as your needs expand. 

So, when considering equipment to provide Network Access for the tools you need to keep your network safe, secure, and in compliance; it would be wise to consider Network Critical’s SmartNA (Network Access) System.

The SmartNA System will give you the flexibility you need to solve your network access problems today and is so flexible it can be changed to meet your needs of tomorrow.

When it comes to networks, you can guarantee one thing -- the network will GROW.

Modular Network Access App Drawing 1 

It always does. Even in the smallest of networks, like the one you have in your home, will grow and change.  You will need to add tools and access more links.

 

Continue reading "Why Invest in a Product that is Built Around a Modular Design? (by George Bouchard)" »


Improving Network Recording and Storage Efficiency with Taps, Aggregation and Filtering

 

Introduction

Most large computer networks are improving their storage infrastructure to meet compliance and security standards.  The deployment and resources required to improve security are under constant assessment. Business and technology are both driving the requirements for improved storage solutions.

 

 

Framework

Providing adequate storage solutions throughout a network is not always technically or financially feasible.  While storage costs per terabyte continue to decline, methods to efficiently manage storage facilities must evolve. 

 

 

Storage-1


Figure 1 - Typical Network Diagram With Probe Deployment using Port Mirror

 

 

 

Network recording has become commonplace for security, compliance and network analysis purposes.  Frequent backups of databases and other high volume traffic can drastically decrease the amount of available storage.  Backing up databases across a network for offsite storage requires adequate bandwidth and is often done so that all data is stored at another location. 

 

 

Recording traffic as it moves from one location to another is conveniently done at egress points of a local network.  Recording of database transfers is often not necessary for compliance or security purposes on a local recording device.  The database is fully transferred to another location, and this becomes the backup copy.  Network data, VOIP conversations, web and application traffic is what is necessary to be recorded.  Eliminating only database backups at the egress recording location has been problematic until the development of filtering TAPs.  

 

Continue reading "Improving Network Recording and Storage Efficiency with Taps, Aggregation and Filtering" »


Round Rock ISD on Mirage Networks

“With our small network IT staff, it is essential that we have an automated solution to stop worms that get past perimeter defenses. With the Mirage Networks solution, instead of 200 or 300 systems to clean up, we’ll only have the initial infection point, which will remain contained until we have the time to remediate that system.”

-- Dan Scott, Senior Systems Engineer, Round Rock ISD


RockroundisdCustomer Profile - Round Rock Independent School District (ISD) is a school district headquartered in the city of Round Rock, Texas, United States. As of 2007, the school district served 39,079 students and includes all of Round Rock, northwestern portions of the City of Austin, and unincorporated portions of Williamson and Travis counties (including Anderson Mill).

Mirage_logoVendor Profile - Mirage Networks, Inc. is the leading provider of Network Access Control (NAC) solutions, including both pre- and post-admission security. The company’s patented technology gives organizations control over unknown, out-of-policy, and infected devices resulting in increased network uptime, policy compliance, and reduced operational costs. Mirage’s NAC appliances work in all network environments, deploy out-of-band, and require neither signatures nor agents to enforce policies and terminate zero-day threats. Based in Austin, Texas, Mirage Networks Endpoint Control is a consistent winner of industry awards and recognition.


Challenge:

Despite firewalls and intrusion detection systems, Round Rock ISD was unable to stop rapidly propagating threats across a state-of-the-art network serving nearly 40,000 users.

Solution:

Mirage NAC immediately stopped the threats without signatures or agents. Additionally, the solution uncovered network abuses arising from incomplete firewall rules and misconfigured PCs.

Benefits:

» Reduced network outages resulting from widespread worm infections
» Saved hundreds of hours of cleanup on infected endpoint devices
» Within 30 minutes of installation, identified unknown holes in firewalls


Continue reading other LoveMyTool posts on Mirage Networks »


Merced Superior Court on Mirage Networks

“I cannot begin to thank … all of the people who assisted me, (including) the great people at Mirage, who installed their Mirage NAC appliance and just ROCKED those hackers & viruses. Their device, to say the least, is just amazing, and scary in how good it worked.”

-- Tony Ortiz, Court IT Manager, Merced Superior Court


Superior_courtCustomer Profile - Each of California's 58 counties has its own superior court, which adds up to a total of 58 Superior Courts of California. The Superior Courts have general jurisdiction over all civil and criminal matters, with the exception of certain limited areas like workers' compensation where original jurisdiction is reserved by statute to government agencies. Merced County is a county located in the Central Valley of the U.S. state of California, north of Fresno and southeast of San Jose. As of 2000 the population was 210,554. The county is named after the Merced River.

Mirage_logoVendor Profile - Mirage Networks, Inc. is the leading provider of Network Access Control (NAC) solutions, including both pre- and post-admission security. The company’s patented technology gives organizations control over unknown, out-of-policy, and infected devices resulting in increased network uptime, policy compliance, and reduced operational costs. Mirage’s NAC appliances work in all network environments, deploy out-of-band, and require neither signatures nor agents to enforce policies and terminate zero-day threats. Based in Austin, Texas, Mirage Networks Endpoint Control is a consistent winner of industry awards and recognition.


Challenge:

The Superior Court of Merced County’s network was down for one week due to a worm attack. Solutions from McAfee, Cisco, and Symantec did not solve the problem.

Solution:

Within one hour of installation, Mirage NAC resolved the network outage and stopped the spread of Sasser variants, enabling LAN segments to return to normal.

Benefits:

» Significantly reduced network downtime by preventing worm propagation
» Reduced IT workload due to ease of deployment and maintenance
» Delivered immediate time-to-value with out-of-the-box effectiveness


Continue reading other LoveMyTool posts on Mirage Networks »


Penn State on Mirage Networks

“Managing each endpoint individually simply isn’t a realistic objective. That’s why a network-based solution makes sense — and why we selected Mirage NAC … Mirage NAC gives us the ability to both watch network traffic and take action when an offending device is identified.”

-- Kathy Kimball, Director of Computer & Network Security, Penn State University


Psu_logoCustomer Profile - The Pennsylvania State University (commonly known as Penn State) is a state-related, land-grant university. The University has 24 campuses throughout the U.S. State of Pennsylvania, including a virtual World Campus. The enrollment at Penn State is over 84,000 students, placing it among the ten largest public universities in the United States. Penn State offers more than 160 majors and administers a $1.4 billion (USD) endowment.

Mirage_logoVendor Profile - Mirage Networks, Inc. is the leading provider of Network Access Control (NAC) solutions, including both pre- and post-admission security. The company’s patented technology gives organizations control over unknown, out-of-policy, and infected devices resulting in increased network uptime, policy compliance, and reduced operational costs. Mirage’s NAC appliances work in all network environments, deploy out-of-band, and require neither signatures nor agents to enforce policies and terminate zero-day threats. Based in Austin, Texas, Mirage Networks Endpoint Control is a consistent winner of industry awards and recognition.


Challenge:

With tens of thousands of students and staff on their network, Penn State was constantly battling malware infections introduced by unmanaged devices.

Solution:

Mirage NAC provides a highly manageable and efficient way to isolate offending devices and protect the network, without requiring the management of thousands of individual endpoints.

Benefits:

» High level of security without rearchitecting existing infrastructure or deploying agents to thousands of endpoints
» Protection for all devices and operating systems for highly heterogeneous environment
» Low TCO and immediate time-to-value


Continue reading other LoveMyTool posts on Mirage Networks »


Health Access Solutions on Mirage Networks

“We were looking for a managed solution and wanted to leverage our existing network service account with SBC/AT&T. We were introduced to Mirage Networks by SBC/AT&T, a major channel partner of Mirage Networks. After considering other vendors, as well as an in-house solution, we ultimately determined that the Mirage network-based approach to endpoint control would be the most effective and reliable solution to meet our continuing security requirements.”

-- Gary D’amato, Systems Manager, Health Access Solutions


HealthaccessCustomer Profile - Health Access Solutions (HAS) is a leading application service provider located in Foster City, California. HAS is the software marketing division of Pacific Partners Management Services, Inc. (PPMSI). Their Access Express™ system distributes patient demographic and clinical information to more than 13,000 physicians affiliated with hospitals, medical groups, and health plans. Access Express software manages and automates managed care referrals, communication, and care for more than 1.8 million HMO and Medicare patients. Health Access Solutions’ healthcare technology team has worked together for years to develop a streamlined information technology and management strategy.

Mirage_logoVendor Profile - Mirage Networks, Inc. is the leading provider of Network Access Control (NAC) solutions, including both pre- and post-admission security. The company’s patented technology gives organizations control over unknown, out-of-policy, and infected devices resulting in increased network uptime, policy compliance, and reduced operational costs. Mirage’s NAC appliances work in all network environments, deploy out-of-band, and require neither signatures nor agents to enforce policies and terminate zero-day threats. Based in Austin, Texas, Mirage Networks Endpoint Control is a consistent winner of industry awards and recognition.


Miragenetworks


Mirage Networks has the only patented NAC solution that:

• Is agentless—requires no agent software to effectively defend against malware attacks
• Enforces surgical isolation—devices can be completely isolated, or granular access can be granted based on the device or the infraction
• Deploys out-of-band—no network re-architecture, no single point of failure
• Is infrastructure independent—The Mirage solution integrates with all networks, all devices, and all operating systems

Continue reading "Health Access Solutions on Mirage Networks" »