Securify Joins Microsoft's NAP Program
Securify has joined the Microsoft NAP program, a policy enforcement technology built into the Windows Vista and Windows Server
May 7, 2007
CUPERTINO, Calif. -- Securify, Inc. today announced it has joined the Microsoft Network Access Protection (NAP) program, a policy enforcement technology built into the Windows Vista and Windows Server. Codenamed “Longhorn,” the operating system allows customers to better protect network assets from unhealthy computers by enforcing compliance with network health policies. Securify is supporting this initiative with its identity-aware monitoring solution that discovers and verifies what each user is doing on the network in real-time, post-admission.
As leading enterprises continue to grant broader access to employees, contractors and partners, the importance of access control and subsequent user monitoring is growing exponentially. According to a poll of Securify clients, IT teams spend an estimated 33 percent of their time trying to manually gain visibility and verify ‘who is doing what and where’ on the network in order to support business initiatives while also meeting audit and compliance requirements. Securify helps enterprises automatically and continuously verify network access and monitor user behavior to improve audit posture, increase IT efficiencies and reduce risk.
“Enforcing access control, addressing security compliance requirements, and verifying what’s happening inside the network are critical components for maintaining agile and secure business practices," said Mike Schutz, group product manager, security and access, Microsoft Corp. "We are pleased that Securify has joined the Network Access Protection program, which leverages Microsoft Active Directory to provide enhanced network monitoring solutions.”
Securify’s solution continuously monitors network activity. It tightly integrates with Microsoft Active Directory to dynamically determine when a user accesses the network, then correlates the user and its groups with all related access and activity. Monitored traffic can be viewed in 'Discovery mode' to show ‘who is doing what and where’ or in 'Verification mode’ to automatically verify traffic against role-based controls and pre-built security best practices. The network-based solution requires no application recoding, requires no agents, and is currently used to monitor more than 2.5 million users worldwide.
“While access protection is a critical requirement, most enterprises also desire to know who is doing what and where on their networks, post admission,” said Steve Woo, vice president, products and marketing, Securify, Inc. “We look forward to being part of Microsoft’s ecosystem to ensure that users are doing only what they should, when they should and with the applications they should be accessing.”
Microsoft Corp. (Nasdaq: MSFT)
You May Also Like