Extreme Networks Sentriant AG Manual de usuario

Busca en linea o descarga Manual de usuario para Software Extreme Networks Sentriant AG. Sentriant AG Data Sheet Manual de usuario

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 6
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 0
Extreme Networks Data Sheet
While efforts to improve network security have
been focused on locking down the network
perimeter and securing critical internal network
assets, the security of endpoint devices, which
make up the majority of networks, have gone
largely untouched.
Attackers, however, are increasingly targeting
endpoint devices, such as LAN workstations,
remote access laptops and home computers to
compromise networks. Their motivation is
simple: endpoint devices typically bypass
standard perimeter security measures and
connect directly into the network.
Extreme Networks
®
Sentriant™ AG verifies that
endpoint devices, such as laptops and desktops,
accessing the network are free from security
threats and in compliance with the organization’s
security standards. It systematically tests end
-
point devices for compliance with organizational
security policies, quarantining non-compliant
machines before they can damage the network.
Sentriant AG dramatically reduces the cost and
effort of securing those devices—devices used
by remote employees and contractors using VPN
or dial-up, devices connecting to the network
directly, and devices connecting through
wireless networks—including devices your IT
group may not own or adequately control.
Target Applications
Wireless and mobile computing
Regulatory compliance for security initiatives
Quarantines endpoint devices that are
not in compliance
Remote access using devices that are not
controlled by the organization
Endpoint policy compliance—protects the network by making
certain that endpoint devices are free from threats and
in compliance with IT security policies.
Noncompliant Endpoint Remediation
Flexible access policies
Agent-less solution
Protection for remote and local connections
Comprehensive Yet Scalable Solution
Deep endpoint testing
Simple, easy deployment
Flexible enforcement options
Powerful Enterprise Integration
Enterprise Integration Framework
Sharing endpoint compliance data
Acting on input from other systems
Endpoint security—Safeguarding your network.
Sentriant
AG
Vista de pagina 0
1 2 3 4 5 6

Indice de contenidos

Pagina 1 - Sentriant

Extreme Networks Data SheetWhile efforts to improve network security have been focused on locking down the network perimeter and securing critical in

Pagina 2 - Connections

Sentriant AG—Page 2Extreme Networks Data SheetFlexible Access PoliciesUsing Sentriant AG, administrators create access policies that define which appli

Pagina 3 - Simple, Easy Deployment

Sentriant AG—Page 3Extreme Networks Data SheetFlexible Enforcement OptionsSentriant AG supports IEEE 802.1x, DHCP, inline and other enforcement scheme

Pagina 4 - Sentriant AG—Page 4

Sentriant AG—Page 4Extreme Networks Data SheetEnterprise Integration FrameworkSentriant AG includes the Enterprise Integration Framework, an open arch

Pagina 5 - Technical Specifications

Extreme Networks Data SheetTechnical SpecificationsSystem RequirementsA dedicated server for product installation with the following minimum system req

Pagina 6 - Ordering Information

Extreme Networks Data SheetOrdering Informationwww.extremenetworks.com email: [email protected] North AmericaExtreme Networks, Inc.

Comentarios a estos manuales

Sin comentarios