Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Nevis Launches Identity-Based Cloaking

MOUNTAIN VIEW, Calif. -- Nevis Networks, a market leader in identity-based policy enforcement solutions that secure network resources, today announced a new Network Resource Cloaking (NRC) capability that enables IT administrators to completely mask key network resources from specific users and user groups. By making network, facility, information and application resources “invisible”, Nevis’ new NRC technology prevents unauthorized users from “seeing” servers, VoIP phones, printers and switches to not only deny access, but eliminate opportunities for launching malicious DOS attacks.

Identity-Based Resource Cloaking

As an identity-based approach to network access control, Nevis’ NRC enforces flexible user access privileges through its inline LANenforcer™ appliances, ranging from simple IP addresses to highly granular services on an application server. For example, a user within an organization’s engineering department can be prevented altogether from sending/receiving traffic to or from an ERP application server. All inbound and outbound traffic that doesn’t meet the profile of a user’s access privileges can be dropped in real time within the network. This prevents an emerging hacking technique that uses network resources as “jump stations” to launch attacks or gain access to sensitive company data.

“By preventing key network resources from being visible to unauthorized users in the first place, Nevis’ NRC provides us with another critical tier of security,” said Jeff Dorsz, telecommunications and network security manager with South Orange County Community College District. “ One of the keys to resource cloaking is that it’s available as an ‘out-of-the-box’ capability that integrates with identity-based policy stores. As a result, LANenforcer configuration efforts are minimal.”

Nevis Networks Inc.