Bradford Networks

Home -> Produits -> Bradford Networks

BYOD is becoming increasingly prevalent, as employees enjoy using familiar technology over corporate-mandated equipment. But since employees may own and possess the devices they're using to do corporate work, how can IT control the security and performance of corporate applications and assets? 

With employee-owned devices, it's a gray area on the amount of control IT has over the endpoint. Can they monitor it, or does monitoring violate employee privacy? Can they take actions to protect the device without employee permission?

Privacy rights of the employee are extremely sticky when dealing with BYOD.

When an employee-owned device is lost or stolen, does IT have the right to remote wipe the device? What about personal data the employee has on the device?

With BYOD, instead of IT worrying about one device per employee, a single employee might use 2, 3 or more devices to access corporate resources.

It should be assumed that BYOD endpoints are security risks, due to a lack of corporate control over the devices.


Network Sentry

The Company’s patented Network Sentry solution enables Cyber Security Teams to continuously assess the risk of every user and endpoint on the network, and automatically remove vulnerable and compromised devices that act as backdoors for cyber criminals. Through its SmartEdge Platform, Network Sentry seamlessly integrates with the leading Advanced Threat Detection solutions to correlate high-fidelity security alerts with a threat’s foothold. This unique correlation bridges the silos of security, network, and endpoint information to enable confident, automated threat containment before it has an adverse impact on the business.

Network Sentry/NAC was purpose-built to deliver Network Access Control (NAC). It dynamically leverages the continuously growing library of security commands and controls built into today’s switches, routers, wireless controllers and wireless access points to perform pre-connect risk assessments on every device attempting to connect to the network. Unlike alternative approaches that depend on 802.1x specific hardware, Network Sentry/NAC leverages the existing network infrastructure to manage up to 20,000 concurrent devices from a single physical or virtual appliance. A manager of managers ensures growth and provides scalability to secure larger scale networks. Setup wizards, seamless integration, and intuitive workflows make installation and configuration simple.

Network Sentry/RTR leverages its unique Live Inventory of Network Connections (LINC) to automatically correlate high fidelity security alerts from the leading firewall and Advanced Threat Detection solutions, including FireEye, Fortinet, and Palo Alto Networks, with detailed contextual information on compromised endpoints, users and applications. Once identified, Network Sentry/RTR triggers an automated response, based on the severity and business criticality of the incident, to contain compromised devices in real time. Network Sentry/RTR also provides detailed historical information on all network connections, giving security experts unprecedented forensics to help fully understand and investigate the threat’s methodology, lifecycle and scope.

Vous êtes ici : Home Produits Bradford Networks