Customers

Client Description Nevis Solution
StemCells, Inc.
StemCells, Inc.
› Read the case study
Centralized identity-based access control for employees and 3rd parties
  • 20% savings compared to to alternative combined access switch-IPS solutions
  • Identity-based access control providing employees and visitors with appropriate access to resources
  • Granular security policies enforced per port/per user
Berding & Weil, LLP
Berding & Weil, LLP
› Read the case study
Easy to deploy access control for 3rd parties using the corporate network
  • Identity-based access control to ensure visitors have appropriate access to resources
  • Fast, accurate threat detection (firewall, anomaly detection, signature matching
  • Microsecond quarantine, shutting down threats at the source
Upper Canada
School District Board

Upper Canada<br> School District Board
› Read the case study
Safe network access control and threat detection for +100 schools and 40,000 users
  • Endpoint integrity verification to ensure endpoints with updated s/w can access the network
  • Appropriate access to network resources for students, faculty and administrators
  • Detection and quarantine of threats in real-time to stop their spread
South Orange County Community College District
South Orange County Community College District
› Read the case study
Pre- & Post-connect access controls. The ability to continuously monitor & report on user activity throughout a network session
  • Endpoint integrity verification for all 40,000 users
  • Provisioning appropriate access control for students, faculty and administrators
  • Identify & Quarantine malware in real-time
Patni Computer Systems Ltd.
Patni Computer Systems Ltd.
› Read the case study
Integrated Access Control for Guests, Contractors & Visitors
  • Allow guests and contractors onto the network with restricted access
  • Provide an audit trail to identify activity by user on guest access points
  • Prevent any type of infection spreading into the corporate network
  • An out of box deployment solution
  • Reduce day to day maintenance of creating access policies
  • Detect and contain malicious activities and protect the corporate network
Aptuit
Aptuit
Employee, guest and contractor authorization, pre and post connect access control
  • LANenforcer 1048s providing employee and non-employee access control in the meeting areas
  • LANenforcer 2024s providing employee and non-employee pre & post connect NAC throughout the network
  • End-point asset ‘cloaking’ to ensure version control for FDA certification
Centrality Communications
Centrality Communications
Per-port LAN security and unauthorized user access control to sensitive assets and intellectual property
  • Global deployment of LANenforcer 1048s to control employee access and to secure guests/meeting rooms
Government Employees Health Association (GEHA)
Government Employees Health Association (GEHA)
Needed a secure network access control solution for external users accessing government healthcare program information.
  • LANenforcer 2024 High Availabilty bundle for access policy enforcement and malware containment
Keystone Automotive
Keystone Automotive
Enterprise-wide access control and identity-based policy enforcement to critical resources
  • LANsight and LANenforcer 2024s providing employee and non-employee access control
KLA-Tencor
KLA-Tencor
Access control to enterprise systems, including access control enforcement in joint collaboration initiatives with partners, and malware containment
  • LANenforcer 1048s providing per-port security and identity-based access controls for key employees, partners and conference room protection
Raytheon
Raytheon
Secure employee access
  • LANenforcer 2024s providing identity-based access control and threat prevention
Reconnex
Reconnex
Per-port LAN security
  • LANenforcer 1048 providing guest and contractor access in controlled areas
Satyam
Satyam
Access control for remote users
  • LANenforcer 2024 providing identity-based access control for VPN users across the enterprise
Yardi
Yardi
Global NAC and identity-based policy enforcement system
  • LANenforcer 2024 bundles that provide threat protection and identity-based access control.

 

Insilica
Insilica
Pre- & post-connect access controls with the ability to provide rapid threat response and containment
  • LANenforcer 2024’s providing protection and access control for users in development centers around the globe
  • Segregation of project resources by role
  • Protection of intellectual property
  • Malware protection
  • Simple user management and provisioning