Feeds

Gadget 'bouncers' hired to patrol biz clouds

If your name's not down, you're not connecting in

Internet Security Threat Report 2014

Security appliance firms are using the big industry push towards cloud services, and the trend of allowing staff to bring their own devices into work, to sell technology that attempts to fix the resulting security mess.

ForeScout Technologies launched a scheme to sell its CounterACT Network Access Control (NAC) technology as a cloud platform to hosted and managed service providers (MSPs) on Tuesday. The firm already plays in hosted but MSPs will be a new string in its bow.

The move coincides with the release by Bradford Networks, a competitor to ForeScout, of an app that enables secure network access for trusted iPads, iPhones and other Apple devices. The app is a feature of the latest version of Bradford’s Network Sentry, version 5.3, which will be generally available this month.

Network Access Control (NAC) technology can be compared to nightclub bouncers. Instead of saying that you can't get in a club with jeans, NAC tech stops laptops accessing a network unless they are fully patched and running up to date anti-virus, for example, an approach that guards against cross-contamination of computer worms. NAC tech can also restrict what areas of a network a guest device (smartphones, mobile, tablet etc) can access, much like bouncers who block access to the VIP area of a club (for VIP area read customer database, accounts etc.)

ForeScout and Bradford Networks compete in the network access control (NAC) and policy compliance market with products and services from the likes of Cisco, Juniper and McAfee.

NAC technology attempts to solve various problems including policy enforcement and access management that other bits of security tech also attempt to tackle. Perhaps because of this confusion the technology, first talked about seven or eight years ago, is still in the early adopter phase. ®

Internet Security Threat Report 2014

More from The Register

next story
Docker's app containers are coming to Windows Server, says Microsoft
MS chases app deployment speeds already enjoyed by Linux devs
IBM storage revenues sink: 'We are disappointed,' says CEO
Time to put the storage biz up for sale?
'Hmm, why CAN'T I run a water pipe through that rack of media servers?'
Leaving Las Vegas for Armenia kludging and Dubai dune bashing
Facebook slurps 'paste sites' for STOLEN passwords, sprinkles on hash and salt
Zuck's ad empire DOESN'T see details in plain text. Phew!
Windows 10: Forget Cloudobile, put Security and Privacy First
But - dammit - It would be insane to say 'don't collect, because NSA'
Symantec backs out of Backup Exec: Plans to can appliance in Jan
Will still provide support to existing customers
VMware's tool to harden virtual networks: a spreadsheet
NSX security guide lands in intriguing format
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.