Lockdown Joins Microsoft Program
Lockdown announced the launch of its open iNAC architecture
SEATTLE -- Lockdown Networks®, the leading provider of Network Access Control (NAC) solutions that ensure all users and devices on the network comply with security and IT policies, today announced the launch of its open iNAC® (intelligent NAC) architecture for collaboration and integration with a full spectrum of security, endpoint and network infrastructure technologies. The iNAC architecture creates an extensible NAC policy environment that enables third-party security and network infrastructure products to collaborate in network access policy decisions, and to share information critical to network and endpoint security with the Lockdown Enforcer™. Through collaborative product development, iNAC-enabled applications enhance overall network security, while simultaneously improving the end-user experience and maximizing the value of IT and security investments. Lockdown’s iNAC architecture is used to integrate Lockdown Enforcer with Enterasys Networks intrusion detection technology, PatchLink patch management software, Microsoft NAP and IBM Tivoli, and will be used for integration with Intel vPro Technology.
Lockdown iNAC delivers a universe of interoperability that increases the security of the network, while improving the end-user experience and productivity. iNAC realizes these benefits by sharing data and integrating policies with diverse solutions such as VPN, application access, firewall, patch management, security frameworks, and intrusion protection and detection solutions.
"We selected Lockdown NAC because it would integrate with our existing infrastructure and allows us to control user access to varying security levels," said George Owoc of EADS Astrium North America. "With iNAC, Lockdown's solution looks even better as we will be able to integrate future infrastructure investments. For example, Lockdown's approach could enable us to fully automate remediation processes for non-compliant endpoints, eliminating the time consuming end-user driven remediation process."
About the Author
You May Also Like