Extreme Networks Sentriant AG Manual de usuario Pagina 3

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 6
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 2
Sentriant AG—Page 3
Extreme Networks Data Sheet
Flexible Enforcement Options
Sentriant AG supports IEEE 802.1x,
DHCP, inline and other enforcement
schemes for maximum deployment
options and easy integration with existing
security systems. These industry-wide
initiatives enable the network infrastruc
-
ture to enforce security policy compli
-
ance on all devices seeking to access
network computing resources.
Sentriant AG also adds extensive policy
compliance and enforcement features in
order to verify that the applications and
services running on endpoint devices
comply with security and access policies.
Figure 3 highlights the key features and
benefits of the Sentriant AG.
Deep Endpoint Testing
Access policies consist of one or more
tests to assess operating system
integrity, verify that key hotfixes and
patches have been installed, verify that
anti-virus and other security applications
are present and up-to-date and detect
the presence of other malware. Any
incidence of potentially dangerous
applications such as file sharing, Peer-to-
Peer (P2P), or spyware is also checked.
Administrators can also create custom
tests through Sentriant AG’s Application
Programming Interface (API). Sentriant
AG ships with dozens of out-of-the box
tests in the following categories:
Operating systems—Tests for
services packs and hotfixes
Browser security policy—Verifies
browser security settings match the
organization’s policy
Security settings—Tests for
macros, services, Windows security
policy, and startup registry entries
Software:
Anti-virus—Tests for required
AV software
P2P—Tests for prohibited P2P
software
Personal firewalls—Tests for
required firewall
Software required and software
not allowed—Defined by
administrator
Worms, viruses and Trojans
Checks for the presence of dozens
of attacks and infections
Simple, Easy Deployment
Sentriant AG installs on a dedicated
server. Installation includes the hardened
Linux operating system, so the installation
process is fast, easy and completely self-
contained. Because Sentriant AG requires
no client-side agents, setup, administra
-
tion and deployment is greatly simplified.
Sentriant AG easily scales from the
smallest to the largest networks. Most
importantly, the solution is cost-effective.
© 2006 Extreme Networks, Inc. All rights reser ved.
Comprehensive and Scalable Solution
Sentriant AG is a powerful endpoint security solution that provides deep and comprehensive testing of endpoint devices. At
the same time, it is easily deployed, supports industry standards and scales to meet the needs of the largest organizations.
Network Protection
Compliance and Reporting
Administration
Mitigates network damage caused by infected or
unsafe endpoints
Automatically protects against newly released threats
Protects from the range of endpoint-specific threats
Organization-specific testing
Does not inhibit the flow of business
Graduated enforcement
Provides tailored testing/enforcement for variety of
user types (e.g., visitors, executive staff and Windows
2000 users)
Leverages existing network security investments
Verifies that endpoints conform to security policy(s)
Eliminates threat from endpoints that become non-
compliant while connected
Reduces administrative overhead
Documents security/compliance status
Maximizes protection/endpoint coverage with
minimal demands on IT resources
Quick time-to-value
Enterprise-wide protection
Ability to react to/control dynamic environment
in real time
Enables rapid response to security priorities
Guards against single point of failure
Tests endpoints as they connect to the network
Test library updated as frequently as hourly
Multiple test categories, dozens of tests
Fast custom test creation through open API
Flexible enforcement options (grant, deny or quarantine
access) driven by corporate security policies
Offers range of enforcement on a per access policy basis,
from passive monitoring (no enforcement) to strict
enforcement; allows controlled rollout of Sentriant AG
Unlimited number of customizable access policies tailored to,
for example, the level of threat, operating system and
organizational requirements
Enterprise Integration Framework:
• Allows import/export of security compliance data
• Allows third-party systems to control Sentriant AG functions
Tests endpoints against user-defined access policies
Regularly retests endpoints while logged in on administrator-
specified schedules
Endusers of non-compliant endpoints informed of the steps
required to bring devices into compliance
Detailed reporting meets the needs of auditors, managers and
IT staff members
Offers three flexible endpoint testing methods:
• Agent-less
• ActiveX
• Sentriant AG agent
Predefined access policies (High, Medium, Low) available
out-of-the-box
Thousands of endpoints tested and managed simultaneously
Manual overrides allow administrators to retest, quarantine or
grant access on demand
Notifies administrator of testing status via email; displays all
testing activity in real time
High-availability bypass switch with fail-open functionality
Feature Benefit
Figure 3: Sentriant AG Features and Benefits
Vista de pagina 2
1 2 3 4 5 6

Comentarios a estos manuales

Sin comentarios