Endpoint security solutions from vendors such as Check Point and Sygate protect the company LAN from unauthorized users and infected clients, using a combination of client-side agents and a central management server. Now available from ConSentry Networks is a hardware-based, transparent system for monitoring and managing user access that installs in the wiring closet and requires no client software.
ConSentry’s Secure LAN Controllers are based on what the company calls its LANShield Silicon Architecture, which consists of custom traffic processing ASICs that allow incredible real-time views into network traffic. Packets are decoded from Layer 4 all the way to Layer 7, allowing IT to truly “see” what network users are doing. During a recent demonstration, I was able to view both historical and real-time traffic for a single user and also a group of users. From the protocols used to the applications launched to the Web sites accessed, everything was laid out in report form.
The Secure LAN Controller is available in two models. The CS1000 comes with 10 ports and can handle as many as 200 users and 2Gbps of traffic; the CS2400 comes with 24 ports and scales to 1,000 users and 10Gbps. The controllers install transparently between workgroup switches and the core backbone switches.
Creating policies and generating reports is the job of the Java-based management tool ConSentry InSight. InSight hooks into existing Active Directory or RADIUS to extract user and group information. Policies are defined based on group affinity, then pushed to the Controller for enforcement. It’s a powerful way to ensure users are obeying the rules.
ConSentry Secure LAN Controller
Cost: $17,995 for CS1000; $27,995 for CS2400
Having trouble installing and setting up Win10? You aren’t alone. Here are many of the most common...
Win7 Update scans got you fuming? Here’s how to make the most of Microsoft’s 'magic' speed-up patch
Picking an Android phone can be difficult, but we're here to help. These are the top Android phones you...
Confidence in our power over machines also makes us guilty of hoping to bend reality to our code
Developers shouldn't use JSON Web Tokens or JSON Web Encryption in their applications at all, lest...
Oracle's Bob Weiler weighs in on his company's SaaS-centric enterprise cloud strategy and the long,...
The Neurala Developers Program uses C++ for building smart apps and doesn't require developers to...