Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint Security: 6 Questions To Ask Before You Buy: Page 7 of 8

  • Most of the vendors offer the ability to white-list or pre-authenticate their MAC or IP address, so that they can still connect to the network and do their jobs. However, white listing these devices is just a temporary solution, as some of these devices can become compromised and pose harm for your network if infected. Forescout and Mirage Networks can both detect when traffic patterns from these specialized devices change and can quarantine the device.

    Recommendation:
    You probably have many more non-PC endpoints on your network than you realize, and they probably can't be easily isolated to a single VLAN or network segment. Do a careful site survey and determine how these endpoints will interact with any proposed solution.

    6) Where will you create and enforce your security policies?

    As you can tell, any endpoint solution touches on a wide swatch of your computing portfolio: clients, servers, network switch and connection infrastructure, and network-based applications. To bring this all together, you will need to make a decision where the central repository of your endpoint policies will be and how they will be managed, changed, and enforced throughout your network. This could be the same physical place that houses your central user and authentication data, or it could be a completely new security appliance.


    Endpoint Security Products


    Company                        Product

    F5 Networks      Firepass


    Infoexpress
          Infoexpress


    Lockdown Networks

           Enforcer


    Nevis Networks
           LANenforcer


    StillSecure
          SafeAccess


    Vernier Networks
           EdgeWall


    Consentry
           LANShield Controller; Switch


    Mirage Networks

           Endpoint Control


    ForeScout
           CounterACT


    Symantec
           Network Access Control


    Promisec
           Spectator


    AEP Networks
           NACpoint


    MetaInfo
           Safe DHCP


    Juniper
           Unified Access Control


    Trusted Computing Group

    Trusted Network Connect


    Cisco
      NAC Appliance; Cisco Clean Client Access


    Microsoft
           NAP, Longhorn Server


    Aventail
           ST2 SSL VPN


    McAfee
           Policy Enforcer


    Trusted Network Technologies
        Identity

    TNC is leaning towards using 802.1x authentication protocols as its repository " although this is an optional part of their architecture and not a requirement. NAC is more focused on enforcement than NAP, at least at present.