Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Identity & Access

Avenda Systems Helps Control and Secure Personal Devices in the Enterprise

Device Identification and Differentiated Access Reporting Enable Company and Privately Owned Devices to Securely Coexist in the Enterprise

Avenda Systems, a provider of network access security solutions, today announced new features within its eTIPS platform that enable customers to efficiently allow or deny the use of personal devices for workplace applications.

Device Identification and Differentiated Access Reporting Enable Company and Privately Owned Devices to Securely Coexist in the Enterprise

Avenda Systems, a provider of network access security solutions, today announced new features within its eTIPS platform that enable customers to efficiently allow or deny the use of personal devices for workplace applications.

In a trend that mirrors the invasion of the corporate world in the 1980’s by personal computers, today’s employees are beginning to use consumer-oriented technology like the iPad and smartphones to do business – and this means stress and security concerns related to the use of approved and non-approved devices, and internal compliance issues.

Avenda’s eTIPS platform allows IT groups to create policies that tie together a user’s identity and role to a device type and status, which can include IT defined device-based attributes. Avenda’s solution gives customers visibility and control over who is allowed to use a personal device at work and what portions of the network they can access.

“The ability to quickly adapt the network to support these new devices is a key security advantage in the financial industry, as regulations and auditing are a large part of the business,” said Henry Mayorga, Manager of Network Technology at Baron Capital Management in New York City. “The fact that Avenda’s solution works well with our Cisco infrastructure, was easy to deploy, and is reasonably priced makes it ideal for any industry.”

Avenda’s deployment and security benefits now include:

• Support for Windows, Mac OS X, Mac iOS, Android and Linux devices

Advertisement. Scroll to continue reading.

• Ability to fingerprint operating system characteristics for use within policies

• Real-time device transaction views and compliance reporting

Statistics from an RSA-sponsored survey released earlier this year revealed that 23 percent of the largest organizations surveyed have experienced a serious breach or incident because of a personal device on the corporate network. Additionally, nearly 60 percent said that unauthorized connections to the corporate network occur in spite of efforts to prevent them. In a separate report released by Cisco in November, the majority of employees (66 percent) responding to a survey, believe they should be able to connect freely with any device – personal or company-issued – and access the applications and information that they need around the clock.

“Creative new applications for the iPad and other emerging tablet PCs are driving enterprise requirements to support these new devices regardless of who owns them,” said Krishna Prabhakar, CEO of Avenda Systems. “Customers are proactively looking to securely support personal devices, as the productivity benefits and the fast adoption by users are hard to ignore.”

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.

Register

Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.

Register

Expert Insights

Related Content

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Mobile & Wireless

Infonetics Research has shared excerpts from its Mobile Device Security Client Software market size and forecasts report, which tracks enterprise and consumer security client...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Mobile & Wireless

Critical security flaws expose Samsung’s Exynos modems to “Internet-to-baseband remote code execution” attacks with no user interaction. Project Zero says an attacker only needs...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Mobile & Wireless

Technical details published for an Arm Mali GPU flaw leading to arbitrary kernel code execution and root on Pixel 6.