ConSentry's Secure LAN Controllers enforce access control policies from the wiring closet
Endpoint security solutions from vendors such as Check Point and Sygate protect the company LAN from unauthorized users and infected clients, using a combination of client-side agents and a central management server. Now available from ConSentry Networks is a hardware-based, transparent system for monitoring and managing user access that installs in the wiring closet and requires no client software.
ConSentry’s Secure LAN Controllers are based on what the company calls its LANShield Silicon Architecture, which consists of custom traffic processing ASICs that allow incredible real-time views into network traffic. Packets are decoded from Layer 4 all the way to Layer 7, allowing IT to truly “see” what network users are doing. During a recent demonstration, I was able to view both historical and real-time traffic for a single user and also a group of users. From the protocols used to the applications launched to the Web sites accessed, everything was laid out in report form.
The Secure LAN Controller is available in two models. The CS1000 comes with 10 ports and can handle as many as 200 users and 2Gbps of traffic; the CS2400 comes with 24 ports and scales to 1,000 users and 10Gbps. The controllers install transparently between workgroup switches and the core backbone switches.
Creating policies and generating reports is the job of the Java-based management tool ConSentry InSight. InSight hooks into existing Active Directory or RADIUS to extract user and group information. Policies are defined based on group affinity, then pushed to the Controller for enforcement. It’s a powerful way to ensure users are obeying the rules.
ConSentry Secure LAN Controller
Cost: $17,995 for CS1000; $27,995 for CS2400
Android 5.1 fixes a lot of what's wrong in 5.0.
Macworld goes hands-on with Apple's thinnest, just-announced laptop. It's so thin, it can only fit a...
With only the third CEO in the company's history, Microsoft did not want to remain complacent and on...
Sponsored by Nuage Networks
Sponsored by Fibre Channel Industry Association
Suddenly, everyone is worried about malicious hackers breaching networks connected to airplane control...
An open, fully connected environment is impossible and dangerous, which is why IoT is really a...
Patent trolls have outpaced patent law and even figured out which court is best for filing lawsuits --...
As the enterprise transitions from disk to flash, the focus shifts from optimizing for performance to...