Dedicated VPN and LAN Enforcement
The division between the trusted network and untrusted network has traditionally been a fixed perimeter. This model is inadequate when systems routinely cross untrusted and trusted network borders. An infected system can quickly infect other systems on the network after catching a virus on the Internet. The corporate LAN is especially vulnerable because network resources are more open and prevalent. To remain safe and productive, the network must ensure that all systems are compliant with corporate security policies without impeding workflow.
CyberGatekeeper uses agents with the server to determines whether endpoint compliance with policies, before allowing devices onto the network.
CyberGatekeeper Server hardens the existing network by only allowing access to authorized devices and reporting and blocking rogue endpoints. Non-compliant endpoints are quarantined until remediation brings them back into compliance.
The CyberGatekeeper Server appliance supports multiple methods for managing access to the network. NAC methods include:Dynamic NAC enforcement which requires no changes to infrastructure or equipment; 802.1x NAC which uses VLANs; and in-line NAC which uses a bridge to filter traffic in-line.
Capabilities provided by CyberGatekeeper Server include:
Authentication using 802.1x or Windows domains
Automatic and interactive remediation
Continuous validation of endpoint compliance
Centralized policy updates and configuration
NAC quarantine methods include Dynamic NAC, 802.1x, and in-line filtering