Extreme Networks Sentriant AG Bedienungsanleitung

Stöbern Sie online oder laden Sie Bedienungsanleitung nach Software Extreme Networks Sentriant AG herunter. Sentriant AG Data Sheet Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 6
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 0
Extreme Networks Data Sheet
While efforts to improve network security have
been focused on locking down the network
perimeter and securing critical internal network
assets, the security of endpoint devices, which
make up the majority of networks, have gone
largely untouched.
Attackers, however, are increasingly targeting
endpoint devices, such as LAN workstations,
remote access laptops and home computers to
compromise networks. Their motivation is
simple: endpoint devices typically bypass
standard perimeter security measures and
connect directly into the network.
Extreme Networks
®
Sentriant™ AG verifies that
endpoint devices, such as laptops and desktops,
accessing the network are free from security
threats and in compliance with the organization’s
security standards. It systematically tests end
-
point devices for compliance with organizational
security policies, quarantining non-compliant
machines before they can damage the network.
Sentriant AG dramatically reduces the cost and
effort of securing those devices—devices used
by remote employees and contractors using VPN
or dial-up, devices connecting to the network
directly, and devices connecting through
wireless networks—including devices your IT
group may not own or adequately control.
Target Applications
Wireless and mobile computing
Regulatory compliance for security initiatives
Quarantines endpoint devices that are
not in compliance
Remote access using devices that are not
controlled by the organization
Endpoint policy compliance—protects the network by making
certain that endpoint devices are free from threats and
in compliance with IT security policies.
Noncompliant Endpoint Remediation
Flexible access policies
Agent-less solution
Protection for remote and local connections
Comprehensive Yet Scalable Solution
Deep endpoint testing
Simple, easy deployment
Flexible enforcement options
Powerful Enterprise Integration
Enterprise Integration Framework
Sharing endpoint compliance data
Acting on input from other systems
Endpoint security—Safeguarding your network.
Sentriant
AG
Seitenansicht 0
1 2 3 4 5 6

Inhaltsverzeichnis

Seite 1 - Sentriant

Extreme Networks Data SheetWhile efforts to improve network security have been focused on locking down the network perimeter and securing critical in

Seite 2 - Connections

Sentriant AG—Page 2Extreme Networks Data SheetFlexible Access PoliciesUsing Sentriant AG, administrators create access policies that define which appli

Seite 3 - Simple, Easy Deployment

Sentriant AG—Page 3Extreme Networks Data SheetFlexible Enforcement OptionsSentriant AG supports IEEE 802.1x, DHCP, inline and other enforcement scheme

Seite 4 - Sentriant AG—Page 4

Sentriant AG—Page 4Extreme Networks Data SheetEnterprise Integration FrameworkSentriant AG includes the Enterprise Integration Framework, an open arch

Seite 5 - Technical Specifications

Extreme Networks Data SheetTechnical SpecificationsSystem RequirementsA dedicated server for product installation with the following minimum system req

Seite 6 - Ordering Information

Extreme Networks Data SheetOrdering Informationwww.extremenetworks.com email: [email protected] North AmericaExtreme Networks, Inc.

Kommentare zu diesen Handbüchern

Keine Kommentare