Extreme Networks Sentriant AG User Manual

Browse online or download User Manual for Software Extreme Networks Sentriant AG. Sentriant® AG200 [en]

  • Download
  • Add to my manuals
  • Print
  • Page
    / 8
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 0
Extreme Networks Data Sheet
While efforts to improve network security have
been focused on locking down the network
perimeter and securing critical internal network
assets, the security of endpoint devices, which
make up the majority of devices on the network,
have gone largely untouched.
Security attacks, however, are increasingly
originating from endpoint devices such as LAN
workstations, remote access laptops and home
computers to compromise networks. The reason
is simple: endpoint devices typically bypass
standard perimeter security measures and
connect directly into the network.
Extreme Networks
®
Sentriant AG200 verifies
that endpoint devices accessing the network,
such as laptops and desktops, are free from
security threats and in compliance with the
organization’s security standards. It systematically
tests endpoint devices for compliance with
organizational security policies, quarantining
non-compliant machines before they can damage
the network.
Sentriant AG200 dramatically reduces the cost
and effort of securing internal network access. It
tests devices used by remote employees and
contractors using VPN or dial-up, devices
connecting to the network directly, and devices
connecting through wireless networks—including
devices your IT group may not own or adequate-
ly control.
Target Applications
Preventing the introduction of malware or •
use of high risk software in the network
Protecting the LAN from remote or foreign •
devices that are not controlled by the
organization
Security initiatives for regulatory compliance •
(SOX, HIPAA, PCI-DSS)
Network Access Control (NAC)—protects the network by verifying
that endpoint devices are free from threats and in
compliance with IT security policies.
Advanced Endpoint Integrity Testing
Flexible access policies•
Comprehensive test suite•
Pre-connect testing•
Wide range of endpoint support•
Flexible Deployment Options
Multiple enforcement methods•
Single-server or multi-server deployment•
Simple, easy installation and rollout•
Enterprise-Class Management and
Administration
Centralized management•
Multi-user, role-based administration•
Powerful reporting capabilities•
Enterprise Integration Framework•
Sentriant security solutions—Safeguarding your
network.
Sentriant
®
AG200
Page view 0
1 2 3 4 5 6 7 8

Summary of Contents

Page 1 - Sentriant

Extreme Networks Data SheetWhile efforts to improve network security have been focused on locking down the network perimeter and securing critical in

Page 2 - Extreme Networks Data Sheet

5151-01Extreme NetworksInternetSentriant AG200AgentGuest/VisitorManaged MachineAgentAgent-lessAgent-lessActiveXActiveXTesting OptionsEndpoint TypesCon

Page 3 - Flexible Deployment Options

Sentriant AG200—Page 3Extreme Networks Data SheetMultiple Enforcement Methods Sentriant AG200 supports several standards-based enforcement schemes for

Page 4 - Sentriant AG200—Page 4

Sentriant AG200—Page 4Extreme Networks Data SheetCentralized ManagementSentriant AG200 consolidates all NAC operations within a centralized web-based

Page 5 - Technical Specifications

Extreme Networks Data SheetTechnical SpecificationsSentriant AG200—Page 5© 2008 Extreme Networks, Inc. All rights reser ved. PerformanceSentriant AG Ma

Page 6

Extreme Networks Data SheetTechnical SpecificationsSentriant AG200—Page 6© 2008 Extreme Networks, Inc. All rights reser ved. Endpoint SupportOperating

Page 7

Extreme Networks Data SheetTechnical SpecificationsStandard Endpoint Tests that Ship with Sentriant AG200: Operating Systems—WindowsWindows 2000 hotfixe

Page 8 - Ordering Information

Extreme Networks Data SheetTechnical SpecificationsOrdering InformationPart Number Name Description72002 Sentriant AG200 Management Server w/100 endpoi

Comments to this Manuals

No comments