Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Startup Offers Directory-Based Security Appliance

Joining the ranks of security-appliance vendors this week is startup Identity Engines, which today is expected to launch a $15,000 box designed to quickly add centrally managed identity-based security to enterprise networks.

Called the Ignition Model 3000E, the first offering from the Mountain View, Calif.-based Identity Engines can support between 500 and 2,000 clients active per device, according to Roy Chua, the company's vice president of marketing. The appliance, Chua said, will use existing directory and authorization client data (including RADIUS and LDAP information) to act as central administration point for authentication, authorization and accounting (AAA) of network users.

With such an appliance, network administrators can more easily set policies and permit more-flexibile yet secure access to their networks, said Chua, who said that server-based authentication software products have not kept pace with the expanding complexity of corporate networks that may now include a wide range of access technologies like wireless and virtual private network connections, and multiple application servers with a wide mix of users.

"The products out there to do authentication were designed 10 years ago," said Chua, who said that current identity-management systems may reside on multiple corporate servers, without a single coherent management point. "What's missing is the intelligence to manage the access [policies] across complex networks. That's the gap we fill."

As networks become more important to enterprises' businesses, there is a desire to make assets available to as many users as possible. But growing in lockstep with expanded access is the very real threat of viruses and hackers, whose presence can cause not only expensive network downtime but also the loss of business-critical information.

  • 1