Pick Your Security Focus:
Home > IT Security

 
 
  Save to Favorites |Comments |Feedback
Caymas Systems

Caymas Systems

Description: The Caymas Systems network access solution bases access policy on the identities of users as well as applications, locations, devices and other variables.


Products:

Caymas Systems Network Access Control (NAC)
Caymas Systems Identity-Based NAC appliancesare the only appliances that provide both remote access and Network Access Control from a single platform. Caymas appliancesfeature the most advanced policy engine, accepting inputs based on the identities of users, devices, locations, applications, and the results of host integrity checks, to provide a single point of policy enforcement for enterprises and government organizations. The result is unprecedented visibility and control for access to the network and to systems, applications, files in an enterprise. The Caymas Systems policy engine and hardware architecture harness the Power of IdentityTM to create the most advanced Network Access Control (NAC) platform available. First, Caymas’ integrated Host Integrity Checker scans the user’s PC for acceptable security configuration, then leverages the existing authentication and authorization infrastructure to provide fine-grained access control to the network. Devices that attempt entry to the network must meet security and configuration policy requirements or are directed to a quarantine area for remediation. Caymas appliances control network access based on the user’s identity and access rights, providing a second layer of network protection. With Caymas gateways protecting LAN segments, only authorized users with clean PCs will ever enter the network, and they can only access the specific files and applications they are permitted to use. Most NAC appliances in the market only provide L2 access control via VLAN switching for internal LAN users. Caymas recognizes the reality of the virtual enterprise – that users are distributed and mobile – and therefore IT needs to provide access controls to both remote and local users on the same platform. It is not sufficient to only provide access to the network. Controlling where users go once they gain access to the network, including access to specific hosts, applications and files is needed to secure an enterprises’ IT infrastructure.


Case Studies:

  • Mount Sinai Hospital
  •  
     

     

     
     
     
    Terms of Service | Privacy Policy |For Sponsors | © Copyright 2007 IP Events, Inc