MOUNTAIN VIEW, Calif. -- Nevis Networks, a market leader in identity-based policy enforcement solutions that secure network resources, today announced a new Network Resource Cloaking (NRC) capability that enables IT administrators to completely mask key network resources from specific users and user groups. By making network, facility, information and application resources invisible, Nevis new NRC technology prevents unauthorized users from seeing servers, VoIP phones, printers and switches to not only deny access, but eliminate opportunities for launching malicious DOS attacks.
Identity-Based Resource Cloaking
As an identity-based approach to network access control, Nevis NRC enforces flexible user access privileges through its inline LANenforcer appliances, ranging from simple IP addresses to highly granular services on an application server. For example, a user within an organizations engineering department can be prevented altogether from sending/receiving traffic to or from an ERP application server. All inbound and outbound traffic that doesnt meet the profile of a users access privileges can be dropped in real time within the network. This prevents an emerging hacking technique that uses network resources as jump stations to launch attacks or gain access to sensitive company data.
By preventing key network resources from being visible to unauthorized users in the first place, Nevis NRC provides us with another critical tier of security, said Jeff Dorsz, telecommunications and network security manager with South Orange County Community College District. One of the keys to resource cloaking is that its available as an out-of-the-box capability that integrates with identity-based policy stores. As a result, LANenforcer configuration efforts are minimal.