14 posts categorized "Network Access Control" Feed

What the cloud can offer YOU! (by Josh Stephens)

The other day, one of my CIO friends was complaining about the lack of physical space in her data center –full racks, no place for power and no air/heating capacity.

She’s not the only one I hear this from.  It’s a pretty common problem for IT practitioners today.  The answer: The Cloud.  Yes, I said it – The Cloud.

 There’s certainly enough hype around the term “cloud” to make skeptics of all of us.   But there is substance and value to what cloud computing is intended to do.

What does it really mean?   

Cloud Tech question 

Simply put, it’s a style of computing that is highly elastic and scalable that you can purchase based on consumption and demand. 

There are different twists to managing this type of IT environment, depending on whether your company is doing a public or a private cloud deployment.

Continue reading "What the cloud can offer YOU! (by Josh Stephens)" »


Why Invest in a Product that is Built Around a Modular Design? (by George Bouchard)

Why is Modularity important when considering purchasing a network access product? Well, for example, it may not be practical to design a house in a modular fashion, but if it were practical, then you could build your house exactly the way you wanted it for your needs today.  And if you only had the need for two bedrooms today, you could design it that way.  As your family grew, you could then add more bedroom modules to accommodate the growth of your family or your mother-in-law coming to live with you.

Modular Network Access Image 
Modularity gives you flexibility…you only have to purchase what you need today, and you can add or change functionality as your needs expand. 

So, when considering equipment to provide Network Access for the tools you need to keep your network safe, secure, and in compliance; it would be wise to consider Network Critical’s SmartNA (Network Access) System.

The SmartNA System will give you the flexibility you need to solve your network access problems today and is so flexible it can be changed to meet your needs of tomorrow.

When it comes to networks, you can guarantee one thing -- the network will GROW.

Modular Network Access App Drawing 1 

It always does. Even in the smallest of networks, like the one you have in your home, will grow and change.  You will need to add tools and access more links.

 

Continue reading "Why Invest in a Product that is Built Around a Modular Design? (by George Bouchard)" »


Improving Network Recording and Storage Efficiency with Taps, Aggregation and Filtering

 

Introduction

Most large computer networks are improving their storage infrastructure to meet compliance and security standards.  The deployment and resources required to improve security are under constant assessment. Business and technology are both driving the requirements for improved storage solutions.

 

 

Framework

Providing adequate storage solutions throughout a network is not always technically or financially feasible.  While storage costs per terabyte continue to decline, methods to efficiently manage storage facilities must evolve. 

 

 

Storage-1


Figure 1 - Typical Network Diagram With Probe Deployment using Port Mirror

 

 

 

Network recording has become commonplace for security, compliance and network analysis purposes.  Frequent backups of databases and other high volume traffic can drastically decrease the amount of available storage.  Backing up databases across a network for offsite storage requires adequate bandwidth and is often done so that all data is stored at another location. 

 

 

Recording traffic as it moves from one location to another is conveniently done at egress points of a local network.  Recording of database transfers is often not necessary for compliance or security purposes on a local recording device.  The database is fully transferred to another location, and this becomes the backup copy.  Network data, VOIP conversations, web and application traffic is what is necessary to be recorded.  Eliminating only database backups at the egress recording location has been problematic until the development of filtering TAPs.  

 

Continue reading "Improving Network Recording and Storage Efficiency with Taps, Aggregation and Filtering" »


Round Rock ISD on Mirage Networks

“With our small network IT staff, it is essential that we have an automated solution to stop worms that get past perimeter defenses. With the Mirage Networks solution, instead of 200 or 300 systems to clean up, we’ll only have the initial infection point, which will remain contained until we have the time to remediate that system.”

-- Dan Scott, Senior Systems Engineer, Round Rock ISD


RockroundisdCustomer Profile - Round Rock Independent School District (ISD) is a school district headquartered in the city of Round Rock, Texas, United States. As of 2007, the school district served 39,079 students and includes all of Round Rock, northwestern portions of the City of Austin, and unincorporated portions of Williamson and Travis counties (including Anderson Mill).

Mirage_logoVendor Profile - Mirage Networks, Inc. is the leading provider of Network Access Control (NAC) solutions, including both pre- and post-admission security. The company’s patented technology gives organizations control over unknown, out-of-policy, and infected devices resulting in increased network uptime, policy compliance, and reduced operational costs. Mirage’s NAC appliances work in all network environments, deploy out-of-band, and require neither signatures nor agents to enforce policies and terminate zero-day threats. Based in Austin, Texas, Mirage Networks Endpoint Control is a consistent winner of industry awards and recognition.


Challenge:

Despite firewalls and intrusion detection systems, Round Rock ISD was unable to stop rapidly propagating threats across a state-of-the-art network serving nearly 40,000 users.

Solution:

Mirage NAC immediately stopped the threats without signatures or agents. Additionally, the solution uncovered network abuses arising from incomplete firewall rules and misconfigured PCs.

Benefits:

» Reduced network outages resulting from widespread worm infections
» Saved hundreds of hours of cleanup on infected endpoint devices
» Within 30 minutes of installation, identified unknown holes in firewalls


Continue reading other LoveMyTool posts on Mirage Networks »


Merced Superior Court on Mirage Networks

“I cannot begin to thank … all of the people who assisted me, (including) the great people at Mirage, who installed their Mirage NAC appliance and just ROCKED those hackers & viruses. Their device, to say the least, is just amazing, and scary in how good it worked.”

-- Tony Ortiz, Court IT Manager, Merced Superior Court


Superior_courtCustomer Profile - Each of California's 58 counties has its own superior court, which adds up to a total of 58 Superior Courts of California. The Superior Courts have general jurisdiction over all civil and criminal matters, with the exception of certain limited areas like workers' compensation where original jurisdiction is reserved by statute to government agencies. Merced County is a county located in the Central Valley of the U.S. state of California, north of Fresno and southeast of San Jose. As of 2000 the population was 210,554. The county is named after the Merced River.

Mirage_logoVendor Profile - Mirage Networks, Inc. is the leading provider of Network Access Control (NAC) solutions, including both pre- and post-admission security. The company’s patented technology gives organizations control over unknown, out-of-policy, and infected devices resulting in increased network uptime, policy compliance, and reduced operational costs. Mirage’s NAC appliances work in all network environments, deploy out-of-band, and require neither signatures nor agents to enforce policies and terminate zero-day threats. Based in Austin, Texas, Mirage Networks Endpoint Control is a consistent winner of industry awards and recognition.


Challenge:

The Superior Court of Merced County’s network was down for one week due to a worm attack. Solutions from McAfee, Cisco, and Symantec did not solve the problem.

Solution:

Within one hour of installation, Mirage NAC resolved the network outage and stopped the spread of Sasser variants, enabling LAN segments to return to normal.

Benefits:

» Significantly reduced network downtime by preventing worm propagation
» Reduced IT workload due to ease of deployment and maintenance
» Delivered immediate time-to-value with out-of-the-box effectiveness


Continue reading other LoveMyTool posts on Mirage Networks »