Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Mobile & Wireless

Enterasys Networks Launches BYOD Management Appliance

Appliance Helps Accelerate Custom BYOD Policy Enforcement

Enterasys Networks, a provider of network infrastructure and security solutions, today announced a new bring-your-own device (BYOD) solution designed to help address the increasingly complex and pressing concerns with the BYOD trend, including security, user experience, simplicity and flexibility.

Appliance Helps Accelerate Custom BYOD Policy Enforcement

Enterasys Networks, a provider of network infrastructure and security solutions, today announced a new bring-your-own device (BYOD) solution designed to help address the increasingly complex and pressing concerns with the BYOD trend, including security, user experience, simplicity and flexibility.

The solution, dubbed Enterasys Mobile IAM (Mobile Identity and Access Manager), is available as a physical or virtual appliance, and is able to be implemented without the need for additional IT staffing and serve as a single solution for corporate owned and user owned devices.

Enterasys Logo Enterasys, which is a subsidiary of Siemens Enterprise Communications, also provides professional services to help customers with timely installation and setup of the solution.

The company says that for $22,000, its professional services team, in a 10-day timeframe, can execute the 3,000-device deployment of a customized, guaranteed BYOD solution supporting Apple iOS, Android, Blackberry and other devices, with user/device profiling, authentication, policy management, and user-interface setup.

Other services introduced include integration with other Mobile Device Management (MDM) solutions, VDI deployments from VMware and Citrix, and threat management from Palo Alto Networks.

Features provided by Enterasys Mobile IAM include:

• Device, User and Location-specific network and application access

• Granular enforcement of policies based upon user and device profiles

Advertisement. Scroll to continue reading.

• One-step access to the network without the need for portals

• Automation of policy and provisioning capabilities

The Enterasys Mobile IAM Appliance includes the following features:

• Auto Discovery: Automatic discovery and provisioning of users, devices and access location.

• Multi-Level Device Profiling: The ability to automatically detect device types based upon not only OS (e.g. Apple iOS), but also the device type (e.g., iPad).

• Flexible Onboarding: As enterprises increasingly provide employees with their choice of devices, they need the ability to manage multi-vendor networks. Mobile IAM supports multi-vendor networks, giving users a variety of options for devices and operating systems.

• Context-Based Policy Management: Helps users enforce granular policies to ensure optimal usage of network resources and application capacity while providing end-to-end visibility of employees, guests, devices, and location usage.

• Guest Access Management: Provides context-based policy enforcement and end-to-end management, as well as auditing and reporting on guest access.

• Physical and Virtual offerings: Enterasys Mobile IAM is also offered as virtual appliance.

The Enterasys Mobile IAM appliance offerings are scheduled to be available in Q2 2012 with pricing starting at $20,995 with support for 3,000 mobile devices. Pricing will scale based on the number of devices.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Mobile & Wireless

Infonetics Research has shared excerpts from its Mobile Device Security Client Software market size and forecasts report, which tracks enterprise and consumer security client...