CyberGatekeeper Server Overview

The division between the trusted network and untrusted network has traditionally been a fixed perimeter. This concept is no longer adequate because systems routinely cross between untrusted and trusted networks. An infected system can quickly infect other systems on the network after catching a virus on the Internet. The corporate LAN is especially vulnerable because network resources are more open and prevalent. To remain safe and productive, the network must ensure that all systems are compliant with corporate security policies without impeding workflow.

CyberGatekeeper Server Appliance

CyberGatekeeper Server hardens the existing network by only allowing access to authorized devices and reporting and blocking rogue endpoints. Non-compliant endpoints are quarantined until remediation brings them back into compliance. The CyberGatekeeper Server appliance supports multiple methods for managing access to the network. NAC methods include: the new Dynamic NAC enforcement which requires no changes to infrastructure or equipment; 802.1x NAC which uses VLANs; and in-line NAC which uses a bridge to filter traffic in-line. Capabilities provided by CyberGatekeeper Server include:

  • Authentication using 802.1x or Windows domains
  • Automatic and interactive remediation
  • Continuous validation of endpoint compliance
  • Centralized policy updates and configuration
  • NAC quarantine methods include Dynamic NAC, 802.1x, and in-line filtering

Learn about the extensive benefits and features of CyberGatekeeper Server.