Welcome from Shane Buckley, Nevis COO
Welcome to the inaugural issue of Nevis Full Access, our quarterly e-newsletter. We've included you on our distribution list as a result of your pariticipation in an industry event, downloading other Nevis material, or expressly showing interest in Nevis. We sincerely hope you find the information included here informative and useful. We’ve recently made great progress in signing up key new customers, releasing new versions of our products, and we continue to make great strides in the market. Through this publication we hope to keep you abreast of all the Nevis news, as well as continue to provide you insightful security analysis, best practices information, and industry trends.
In this inaugural issue, we’ve included some exciting information on identity-based access control, a comparison of 802.1x with the Nevis approach to user authentication, and a customer case study highlight. Last month I also had the opportunity to participate in a roundtable discussion on the future of network access control (NAC), and where some industry luminaries see it going, which included Rob Whiteley from Forrester Research. Check it out at the top of the next column. As always, we enjoy hearing your feedback, which you can send to us at: email@example.com.
Best Practices: Identity-based Policy Enforcement
Network infrastructure, and network security solutions are typically not identity-aware, since network packet headers provide information about machine addresses and location, not the user's information. Enforcing identity-based policies with identity-blind systems has proven to be a futile endeavor, in light of increasingly complex security policies, open networks, mobile systems, and unmanaged endpoints. This dilemma facing network security administrators has become an insurmountable obstacle and cash drain, resulting in poorly designed security solutions being implemented at the wrong places in the network.
The solution is to build user identity knowledge into the network fabric, and enforce identity-based policies within the secure network. Network security policies can then be easily mapped from the definition stage into the network security architecture, with clear visibility to user activity through the enforcement, remediation and reporting phases.
Get the Whitepaper
Search All Whitepapers
802.1x: A comparison with the Nevis LAN
This paper describes 802.1x and its role in pre-connect LAN Security. Following a brief overview of the technology, we give some pros and cons of an 802.1x deployment. We then describe a phased plan for LAN security that incorporates 802.1x as well as other user authentication alternatives that can be used in the meantime, should 802.1x not be feasible in the near term.
User authentication is necessary for identity-based access control, and 802.1x clearly promises to meet this need. 802.1x has been around for a number of years and has been proposed as the user authentication solution for both wired and wireless LANs. Formally known as the IEEE Standard for Local and metropolitan area networks – Port Based Access Control, IEEE Standard 802.1x-2004 was initially published in 2001 and later revised in 2004. Since then it has become available in virtually all shipping managed switches. Most switch products even offer the ability to configure the port VLAN based on the user identity, and some even support configuring port-based ACLs. Given its widespread availability, 802.1x would seem the obvious choice for implementing user based authentication in enterprise networks. So why isn’t everyone using it?
Read All Whitepapers
Upper Canada District School Board Selects Nevis to
Secure 100+ Schools
"We needed a solution to reduce the risk of threats gaining access and spreading within our network -- without the need to install client-based software. After evaluating other security solutions, we selected Nevis’ LANenforcer as the best solution to meet our needs.”
--Jeremy Hobbs, Chief Information Officer, UCDSB
Supporting over 40,000 student, teacher, and staff users in their environment, Upper Canada District School Board (UCDSB) needed a cost-effective way to ensure appropriate access controls for their mixed user community – which spans across more than 100 schools.
Read the Full Case Study
Read All Case Studies
New Video from Network World Featuring Forrester Research and Nevis on the Future of NAC
Join Joel Snyder from Opus One and Robert Whiteley, Senior Research Analyst at Forrester Research, along with Nevis’ own Shane Buckley as they discuss their vision of endpoint risk management.
Watch the Broadcast
Recent Press Releases
• NEVIS NETWORKS SECURES NETWORK RESOURCES WITH NEW IDENTITY-BASED CLOAKING TECHNOLOGY
Leading worldwide research firm Infonetics confirms organizations have an overwhelming preference for enforcing Network Access Control (NAC) solutions from within the network.
• NEVIS NETWORKS DELIVERS CRITICAL LAN SECURITY FOR SOUTH ORANGE COUNTY COMMUNITY COLLEGE DISTRICT
Latest release of LANenforcer Operating Software Dynamically Cloaks Network Resources in Real-Time.
Subscribe to the Nevis Blog
The Nevis Illuminations blog provides insight and commentary on current trends in the network security industry.
View the Blog
Info Security Product Guide
Global Product Excellence Awards:
Identity-based Access Control
The Stevie Awards
American Business Awards Finalist 2007
Where to Find Us
Thursday, Sept. 6, 2007
Click for Details
New York, NY
Thursday, Sept. 20, 2007
Click for Details
November 2-9, 2007
Click for Details
Nevis Labs Update
Nevis Labs provides periodic updates of Internet threats and security trends.
Get this Month's Top Vulnerability Report