
Extreme Networks Data Sheet
While efforts to improve network security have
been focused on locking down the network
perimeter and securing critical internal network
assets, the security of endpoint devices, which
make up the majority of networks, have gone
largely untouched.
Attackers, however, are increasingly targeting
endpoint devices, such as LAN workstations,
remote access laptops and home computers to
compromise networks. Their motivation is
simple: endpoint devices typically bypass
standard perimeter security measures and
connect directly into the network.
Extreme Networks
®
Sentriant™ AG verifies that
endpoint devices, such as laptops and desktops,
accessing the network are free from security
threats and in compliance with the organization’s
security standards. It systematically tests end
-
point devices for compliance with organizational
security policies, quarantining non-compliant
machines before they can damage the network.
Sentriant AG dramatically reduces the cost and
effort of securing those devices—devices used
by remote employees and contractors using VPN
or dial-up, devices connecting to the network
directly, and devices connecting through
wireless networks—including devices your IT
group may not own or adequately control.
Target Applications
Wireless and mobile computing
Regulatory compliance for security initiatives
Quarantines endpoint devices that are
not in compliance
Remote access using devices that are not
controlled by the organization
•
•
•
•
Endpoint policy compliance—protects the network by making
certain that endpoint devices are free from threats and
in compliance with IT security policies.
Noncompliant Endpoint Remediation
Flexible access policies
Agent-less solution
Protection for remote and local connections
Comprehensive Yet Scalable Solution
Deep endpoint testing
Simple, easy deployment
Flexible enforcement options
Powerful Enterprise Integration
Enterprise Integration Framework
Sharing endpoint compliance data
Acting on input from other systems
•
•
•
•
•
•
•
•
•
Endpoint security—Safeguarding your network.
Sentriant
™
AG
Comentarios a estos manuales