Menu
Media releases are provided as is by companies and have not been edited or checked for accuracy. Any queries should be directed to the company itself.

Enterasys Networks Announces Trusted End-System Solution

  • 06 July, 2004 12:16

<p>Enterasys Networks (NYSE: ETS), the Secure Networks Company™, has introduced the Trusted End-System (TES), a Secure Networks™ solution that integrates desktop security products with enterprise-wide policy management. Providing the highest level of network security achievable today, this integrated approach enables security enforcement at a granular user level and ensures vulnerable or infected desktop machines are not allowed to access the network.</p>
<p>Sygate and Zone Labs, a Check Point company, are the first endpoint security solution providers to announce certification under the Enterasys Secure Networks Certified Partner program.</p>
<p>Combining the vulnerability assessment and end-system scanning features of industry-leading security software with the identity management and dynamic policy enforcement capabilities of a Secure Networks infrastructure, Enterasys’ policy-based approach eliminates the complexities and deployment costs of traditional VLAN approaches. TES assesses the security level of each attached system as it attempts to connect to the network, and applies previously defined policies to compromised and vulnerable end systems. This policy, applied at the user level, remains in effect until corrective action occurs.</p>
<p>“This announcement is effectively the third phase of Enterasys's Secure Networks strategy,” said Gary Mitchell, Managing Director of Enterasys. “Phase one and two were introducing access control and policy management and adding reporting and interoperability with intrusion detection. This third phase allows endpoints to be blocked or quarantined whenever the agent discovers the host is not compliant with policies.”</p>
<p>“We anticipate a very positive local market response to TES, just as we have seen for the first two phases of Secure Networks,” he said.</p>
<p>Unlike other proposed solutions, TES has been designed by Enterasys as an open standards-based solution for multi-vendor environments. Other endpoint security concepts are proprietary and would require users to deploy a single vendor’s applications on every PC. In addition, other vendors’ security proposals would apply only to routers, a significant limit to the effectiveness of endpoint security efforts since enterprise users most commonly access corporate networks via switch ports and wireless access points. With TES, enterprises can leverage existing desktop security software, and, most importantly, it is available now.</p>
<p>Availability
TES consists of two complementary approaches that can be used individually or together to meet the needs of all types of enterprises and organizations.</p>
<p>- The agent-based solution, which is available now, manages interoperability with leading endpoint security applications.</p>
<p>- The network-based solution, available by the end of the year, is optimized for networks, such as those on a university campus, where distributed endpoints are difficult to manage or agent deployment may not be possible or cost-effective.</p>
<p>Both approaches are based on open industry standards, consistent with Enterasys membership and leadership role in the industry’s Trusted Computing Group.</p>
<p>TES is available from Enterasys channel partners.</p>
<p>The Enterasys Secure Networks Advantage
Enterasys’ industry-leading Secure Networks technology and solutions provide the highest infrastructure security available today. Secure Networks delivers the most granular level of security, providing visibility and control down to the network device, individual user and application level. This enables enterprises to quickly and easily detect, assess, locate and protect against attacks. This unmatched security comes from the integrated policy-based management software architecture that works with the embedded security capabilities Enterasys designs into its entire product line. This unique approach offers significant operational and business benefits, unmatched by vendor offerings that add hardware or software to multiple network access points in an attempt to increase security. In fact, Secure Networks technology can even make networks with competitors’ equipment more secure.</p>
<p>About Enterasys Networks
Enterasys Networks is the Secure Networks Company, providing enterprise customers with innovative network infrastructure products, services and solutions that deliver the security, productivity and adaptability benefits required by Global 2000 organizations. For more information on Enterasys Secure Networks and the company’s products, including multilayer switches, core routers, WAN routers, wireless LANs, network management, and intrusion defense systems, visit enterasys.com.</p>
<p>ENDS</p>
<p>Contacts: Pru Quinlan, Einsteinz Communications - On behalf of Enterasys, Tel (02) 9965 7227 or pru@einsteinz.com.au</p>
<p>This news release contains forward-looking statements regarding future events, activities and financial performance, such as management's expectations regarding future revenue and cash flow; strategic relationships and market opportunities; product development; and other business strategies and objectives. These statements may be identified with such words as "we expect," "we believe," "we anticipate," or similar indications of future expectations. These statements are neither promises nor guarantees, and actual future financial performance, events and activities may differ materially. Readers are cautioned not to place undue reliance on these statements, which speak only as of the date hereof. We expressly disclaim any obligation to publicly update such statements to reflect changes in the expectations, assumptions, events or circumstances on which such statements may be based or that may affect the likelihood that actual results will differ materially. Some risks and uncertainties that may cause actual results to differ materially from these forward-looking statements include, but are not limited to: worldwide and regional economic uncertainty and recent political and social turmoil may continue to negatively affect our business and revenue; we have a history of losses in recent years and may not operate profitably in the future; our quarterly operating results may fluctuate, which could cause us to fail to meet quarterly operating targets and result in a decline in our stock price; we earn a substantial portion of our revenue for each quarter in the last month of each quarter, which reduces our ability to accurately forecast our quarterly results and increases the risk that we will be unable to achieve previously forecasted results; we continue to introduce new products, and if our customers delay product purchases or choose alternative solutions, or if sales of new products are not sufficient to offset declines in sales of older products, our revenue could decline, we may incur excess and obsolete inventory charges, and our financial condition could be harmed; we may be unable to upgrade our indirect distribution channels or otherwise enhance our selling capabilities, which may hinder our ability to grow our customer base and increase our revenue; we have experienced significant changes in senior management and our current management team has been together for only a limited time, which could limit our ability to achieve our objectives and effectively operate our business; there is intense competition in the market for enterprise network equipment, which could prevent us from increasing our revenue and achieving profitability; a portion of the enterprises we sell to rely in whole or in part on public funding and often face significant budgetary pressure, and if these customers must delay, reduce or forego purchasing from us, our revenues could be harmed; we depend upon a limited number of contract manufacturers for substantially all of our manufacturing requirements, and the loss of any of our primary contract manufacturers would impair our ability to meet the demands of our customers; and those additional risks and uncertainties discussed in our most recent filings with the Securities and Exchange Commission, including our annual report on Form 10-K for the fiscal year ended January 3, 2004.</p>

Most Popular
Computerworld
ARN
Techworld
CMO