Novell Expands Endpoint Security Management

Posted on
Share on Google+Share on LinkedInShare on FacebookShare on RedditTweet about this on TwitterEmail this to someone

<p><strong>Waltham, Mass. &mdash; Sept. 23</strong><br />Extending its endpoint security and management solutions to include network access enforcement and compliance, Novell announced the availability of Novell ZENworks Network Access Control. </p><p>This newest member of the ZENworks product line ensures security in heterogeneous network environments by using policies to grant or deny access to the network based on tests that determine if a device meets defined security criteria from patches to host-based firewalls. <br /><br />Without slowing down employee productivity, this ZENworks solution helps organizations reduce the risks associated with network access control (NAC) and meet regulatory requirements such as the Health Insurance Portability and Accountability Act (HIPAA) and the Payment Card Industry Data Security Standard (PCI DSS), as well as internal security policies. <br /><br />”As the threat environment grows more cunning, securing corporate endpoints and networks are two of the most critical issues facing the enterprise today,” said Chris Christiansen, program vice president for IDC Security Products and Services. “Customers want both endpoint security management and network access control to help ensure that network access is only granted to devices that meet IT patch and security requirements. <br /><br />&ldquo;Solution providers like Novell, that offer these combined capabilities, give customers a comprehensive tag-team approach to protecting both their managed devices while also extending management and security to unmanaged devices and guest users, such as consultants, for complete enterprise endpoint security.” <br /><br />Unlike other solutions, this ZENworks product is designed to allow organizations to deploy network access control without requiring additional network equipment or upgrades, making it ideal for heterogeneous network environments. </p><p>Additionally, this new solution is easy to deploy with predefined tests for specific devices or groups and phased deployment options to prevent interruptions in IT operations during implementation. <br /><br />ZENworks Network Access Control provides a key piece of security enforcement, ensuring device compliance with easy-to-define policies, automatic test updates for new patches and continuous monitoring to protect against zero-day attacks. <br /><br />By controlling access to the network using either the agentless, Web-based or agent-based approach, ZENworks Network Access Control extends endpoint security policies to all devices and protects the network through these four steps: <br /></p><ul><li><strong>Pre-connect testing: </strong>Ensures devices are thoroughly tested, approved and secure before they are allowed to access the network by performing the most complete set of checks for both Windows and Macintosh devices in a matter of seconds. </li><li><strong>Post-connect revalidation: </strong>As devices remain connected to the network, tests are repeated on defined time intervals. </li><li><strong>Identity-based management:</strong> Reinforces access security by applying specific policies to users or devices logged onto the network. </li><li><strong>Remediation: </strong>When noncompliant devices attempt to access the network, they are quarantined and remediation is required prior to allowing the device production network access. </li></ul><p><br />”In today&#39;s business environment, mobile computing is the norm and network access control is an essential component of any IT security management strategy,” said Joe Wagner, senior vice president and general manager of Novell Systems and Resource Management. </p><p>”ZENworks Network Access Control helps customers secure their network, keeping their users productive while protecting the processes that power their business.” <br /></p>

Share on Google+Share on LinkedInShare on FacebookShare on RedditTweet about this on TwitterEmail this to someone
cmadmin

ABOUT THE AUTHOR

Posted in Archive|

Comment:

Leave a comment

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>