dystrybutor extreme networks
tel. +48 61 628 43 70 info@versim.pl PL | EN
extreme networks nac

Solutions

Network Access Control (NAC)

extremeThe vast majority of enterprises and institutions that planning strategy of their resources security take into account firewall class systems. Firewalls are an essential component responsible for protection of organization’s data against unauthorized access and external attempts to violate data. Malware in e-mails and botnet attacks are one thing, but we are also exposed on internal attacks. Unaware employee, guest user acting on behalf of competitive companies, disgruntled employee, cleaner called Mitnick… Trust in human relations is a very important factor impacting on the quality and satisfaction of business, but it is worth to equip ourselves in a tool which will ensure that our trust won’t be abused. We often see that inconsistency in the security policy implementation or hardware limitations make sensitive data available to unauthorized people, at their fingertips. But not only this is a problem. How many devices, exactly, are connected to your network? Who is using your network and what access privileges to server resources does he have? Therefore it is good to include network access control (NAC) system when creating a security policy.

 

NACOffered Extreme Control Identity & Access Management system is a NAC grade solution that perfectly addresses the needs of enterprises and institutions in the field of network access layer security. Full visibility of devices connecting to the network, extensive capabilities to profile wire and wireless devices, dynamic assignment of security policies binding VLAN, ACL, QoS, etc., as well as the possibility to validate compliance and vulnerability of end systems – all those features are the invaluable asset in the security information management. ExtremeControl IAM, available as a physical and virtual gateway interceding in authentication process (MAC, 802.1x – AD/LDAP, RADIUS), also allows the implementation of flexible browser based portal, which can be used to login employees and guests. Extensive capabilities of guests services, including sponsored access, SMS codes and multilingual captive portal that can be visually customized to your brand requirement – make that Extreme Networks NAC system is able to meet every needs connected with network access control. Integration with other solutions (such as firewalls, SIEM, MDM, building access control systems) significantly increases the level of automatization of network access processes. Cooperation with third party active LAN devices allows to achieve visibility and basic security without the need to rip and replace the entire infrastructure for a single manufacturer.

 

Want to know more? Contact Us!
Use our security questionnaire!

Endpoint protection

Despite the fact, that antivirus solutions protect almost every workstation and server in the world, the number of security breaches is growing alarmingly. This is mainly due to the fact that traditional antivirus systems are reactive solutions, that focus on detection and response to already known threats.

Today however, experienced attackers are able to easily evade traditional antivirus solutions using low cost and automated online tools that allow them to generate the countless number of unique, previously unknown attacks. Therefore, traditional antivirus as a security breaches prevention system is no longer sufficient.

Organization, if it wants to prevent intrusions and data leakages must defend itself against known and unknown threats as well as from the weakness of traditional antivirus solutions. To achieve this, it should put emphasis on prevention. Prevention is in fact the only effective way to reduce the frequency and consequences of cyber-breaches. The old truth: Prevention is better (and cheaper) then cure…

In today’s reality of common use of previously unknown threats and vulnerabilities in targeted attacks, it is more important than ever that workstations are actively protected.

Endpoint Protection class solution should provide users a convenient experience and enable them to conduct their daily activities without concern about infection. An advanced workstation protection product must allow users to freely use mobile and cloud technologies, while ensuing protection against unknown threats. Users must be confident and know that they are protected against accidental execution of malware or exploit, that could comprise their system.

Advanced endpoint protection solution should provide:
• Prevent all exploits, including those utilizing unknown zero-day vulnerabilities
• Prevent all malicious executables, without requiring any prior knowledge of the threat
• Detailed data about prevented attacks
• High scalability with minimal system load
• Tight integration with network and cloud security solutions

Offered by Versim, the advanced next generation endpoint protection solution – Palo Alto Networks Traps, fulfills all the above mentioned conditions. The operation of Traps solution comes down to core techniques, that any attacker must use in order to conduct a successful attack. Using such approach, Traps can block attacks before malicious code succeed.

Palo Alto Networks Traps – Multilayer Endpoint Prevention Method against known and unknown Malware threats.

Palo Alto Advanced Endpoint Protection Traps integrated with Palo Alto Next-Generation Firewall create innovative security platform (Next-Generation Security Platform), that provides security of application delivery process and protection against both known and unknown network, cloud and endpoint threats.

 

Want to know more? Contact Us!
Use our security questionnaire!

Firewalls

paloaltoFirewall systems monitor the exchange of network traffic exchange between local organization network and public internet network. Therefore they have the greatest strategic importance among all components of security infrastructure, and are an ideal point to enforce policies. However, traditional systems during classification of network traffic take into account only ports and protocols, thus allowing more advanced applications and users to easily bypass safeguards using simple methods as dynamic port changing, transmission via port 80, SSL encryption and use of untypical ports.

 

Resulting loss of transparency and control exposes company to temporary drop in productivity, creates problems with regulatory compliance, increases operational costs and creates a risk of sensitive data loss. Traditional approach to above problem involves the need to use additional elements to support firewall operations. Such approach, besides additional costs, does not solve the problem, as it reduces the transparency of network traffic, increases the complexity of management, increases delays connected with multi-scan architecture and limits the bandwidth.

 

Modern firewall systems from Palo Alto Networks, offered by VERSIM, give enterprises the transparency of network communication and control over applications, scanning their content for threats, thus allowing for effective risk analysis. Key features of PaloAlto firewall systems:

  • Ability to identify applications on all ports, regardless of used protocols, SSL encoding or other transmission methods used to avoid detection,
  • Ability to control policy not only on IP address basis but also based on user identity and/or its membership in a specific group,
  • Providing real-time security against attacks and malware existing in application network traffic,
  • Providing multi-gig throughput without performance loss when operating in in-line mode

foto4

 

Want to know more? Contact Us!
Use our security questionnaire!

SIEM systems

A security architecture used as the first line of defense is changing too slowly in comparison to the newest methods of attack – and as a result, it increasingly fails. ADS (Attack Deception System) is an original product of the Polish company STM Solutions, created and designed from ground up based on many years of experience in conducting authorized hacking attacks in many Polish companies. As a result, the solution is tailored to the specifics of Polish organizations and ensures high efficiency. ADS is an implementation of a new approach to cyber-security, originating from well-known “honeyspot” mechanism, which is aimed at attracting an intruder to a separated place within the infrastructure – trap. Thus, the intruder will divert his attention from mission-critical and strategic components of the infrastructure.

ADS system allows for detection of anomalies and unauthorized activities in IT systems, industrial automation systems and using data from physical access control systems and CCTV solutions, combining:

  • reactive protection – the basis of the solution is detection of attacks based on logs from corporate security systems

and

  • proactive protection – an integral part of the solution are so-called honeypots in a form of 3 types of modules: Wi-Fi, SCADA and DMZ. Honeypots are „traps”, that are isolated from the essential production environment. These components mimic the protected infrastructure and are configured in such a way, that their security mechanisms are moderately complicated to compromise for an experienced hacker. After penetrating by attacker, ADS enables mechanisms to identify and register methods and tools used by attacker. Security managers of client environment are observing the attack and are able to control the hacker’s activity to analyze, identify and implement risk mitigation method and reduce attack results such as theft of key data, services degradation or disrupting of business continuity.

 

What is unique in the ADS solution?

  • The solution created by a Polish company, based on its own assets – therefore the source code of the software is located on the territory of Poland and is unavailable to foreign entities.
  • The product is a result of many years of experience in conducting of authorized hacking attacks in many Polish companies (the manufacturer provides IT security services, including penetration tests).
  • The solution has a Polish-language user interface.
  • The ADS system is implemented in the Customer’s infrastructure by Polish engineers, who are able to provide direct technical support, both during system stabilization and when there is a need to modify or expand it.
  • An important component of the solution are so-called honeypots in a form of security modules: DMZ, Wi-Fi, SCADA, providing proactive protection against various types of attacks, complementing reactive protection, including detection of attacks by collecting and correlating logs.
  • The product may optionally be equipped with modules, that are not currently available in products of this category, allowing for: detection of critical infrastructure ports scanning, searching of improperly configured corporate Wi-Fi networks clients or detecting of potentially malicious base stations.
  • The ADS has embedded alarms related to the most important events, reflecting typical unauthorized activities, and in order to maintain a high level of immediate responsiveness, customer may choose correlation rules, from the numerous possibilities, that are the most important for him.
  • The ADS detects attacks, reconnaissance and unknown infrastructure as well as misconfiguration of user’s endpoint devices.
  • It allows to “control” the attacker in order to limit the scope of the attack, delay the achievement of the target, gather better data for attack analysis and forensics.
  • Provides detection of new and unknown methods of attack
  • Comprehensively protects working environment, including IT, OT, physical access control systems and CCTV systems.
  • Flexible licensing model irrespective on the volume of collected data and the number of events per second
  • Many ideas regarding further development of the system and its additional modules, primarily taking into account expectations and needs of organizations operating on the Polish market.

 

Want to know more? Contact Us!
Use our security questionnaire!

MDM systems

fancyfon1Does your organization have a fleet of smartphones and tablets? Do you store and process sensitive data about customers and projects or classified information, or personal data? If so, it is important to properly secure company mobile devices. Almost every lost phone faces an attempt to get access to it and review its contents. Theft of device or unaware downloading of malware application by employee also creates risk on key company information – for example company’s mail with data about customers, offers and projects. Such information can cost a fortune and therefore it is worth to consider the implementation of mobile device management (MDM) system.

 

MDM FAMOCFAMOC system has been created by native FancyFon company as a response to above mentioned challenges that result from – undoubtedly very attractive for every company – mobility. On the one hand, you receive a security mechanism implemented at the device, system and application level, such as enforcement of screen lock, list of allowed applications or password protected access. On the other hand, you gain a convenient tool to manage inventory of your fleet – SIM cards data, contracts with operator, repair history, assigned users, etc. For the purposes of remote collaboration with phone user, it is possible to use geolocation functions and remote desktop. In critical situation remote operations on the device are available – locking of screen with the change of password, applications management with starting and stopping, and finally very useful feature of remotely restore the device to factory setting when it was stolen or lost, it protects your device against loss of information, which are more valuable than a phone.

 

The FAMOC also offers a high class and responsive technical support, which does not have language barrier.

 

The FAMOC system, as a result of our efforts, can by integrated in your infrastructure together with Extreme Networks NAC, providing additional information about user’s device to NAC. If a device is not compliant with corporate security policy, access to critical network data will be blocked.

 

Due to differences between manufacturers of mobile devices and implementations of operating system, a set of available MDM features is heterogeneous.

 

Want to know more? Contact Us!
Use our Kwestionariusza Mobilnej firmy!

Multi-factor authentication

Swivel Secure’s offer includes intelligent multi-factor authentication tools that are protected against unauthorized use for company applications and data. Regardless of the choice of authentication using: one-time code in the mobile application, traditional hardware token or fingerprint Swivel Secure solution full highest security.

With PINsafe® technology at the core for ultimate security and risk-based authentication providing dynamic control, the award winning AuthControl Sentry® delivers an intelligent multi-factor authentication solution for business. AuthControl Sentry® has the fl exibility to support a range of architectural requirements and the ability to ensure maximum adoption, with a wide choice of authentication factors. Whether utilising the mobile application, or the latest in biometrics via the fi ngerprint reader, AuthControl Sentry® establishes itself as a leading solution in cybersecurity.

What makes it different?

  • Patented PINsafe® technology for ultimate security
  • Supports on-premise and cloud for all architecture
  • A single tenancy and single tiered cloud solution, ensures optimised customisation and control
  • Risk-based authentication and single sign-on as standard
  • Integrates seamlessly with hundreds of applications
  • Ensures maximum adoption with an extensive range of authentication methods – up to ten factors!

There are no restrictions with AuthControl Sentry®. It’s designed to authenticate access to applications whether they’re hosted in the cloud or on-premise, and whether the user is a customer, an employee, or a supplier requesting access. If the client architecture is used, this is done through the locally installed Active Directory Agent application, which eliminates the need to provide Active Directory over the Internet, while maintaining user account synchronization. The cloud-based architecture is characterized by a fixed IP address, a dedicated Authcontrol Cloud virtual machine and a private firewall.

Single sign-on (SSO) functionality for AuthControl Sentry® is a feature providing users with the ability to access all of their applications, with a single authentication process, ensuring users work effi ciently without compromising security. Swivel Secure provides a Unified Portal to deliver frictionless access for your users. By using this single point of access, users’ privileges can be managed and behaviour can be tracked for auditing purposes, enhancing security and providing accountability.

Risk-based authentication (RBA) is a dynamic feature of AuthControl Sentry®, designed to automatically request the appropriate level of authentication to access applications. Based on parameters set in the policy engine, RBA will request the appropriate level of authentication to access applications based on the user, their device and the application.

The User Portal is a feature of AuthControl Sentry®, designed to provide administrators with a confi gurable solution to deliver autonomy to users for basic self-administration tasks. The User Portal provides administrators with the capability of giving users direct access, allowing them to execute regular requirements such as changing or resetting a PIN, or provisioning the mobile app.

PINsafe® is the patented technology behind the image authentication factors PINpad®, PICpad and TURing, part of the range of authentication factors available with AuthControl Sentry®, the multi-factor authentication solution designed to protect organisations from unauthorised access to their applications, networks and data.

How doe s PINsafe® work? Each user is issued a PIN number – however this exact PIN is never typed in. When a user needs to securely authenticate, they’re sent a 10-digit security string – a random sequence of characters or numbers. The security string can be displayed as a graphic (TURing, PINpad® or PICpad) or sent via email or through SMS verifi cation. By using the PIN as a positional indicator, a one-time code for authentication can be extracted.

Swivel Secure provides an extensive range of authentication factors to ensure each deployment provides maximum adoption across your whole organisation. Whether you choose to authenticate utilising the OTC on the mobile app (AuthControl Mobile®, a traditional hardware token or even using your fingerprint) Swivel Secure’s AuthControl Sentry® provides ultimate security and confi gurability to suit your business’ security needs.

  • Image factor:

PINpad®: A 10-digit code is presented in the form of a number grid in the user’s web browser. The user then simply clicks on the images that represent their PIN. Each image clicked then transmits a different OTC code to AuthControl Sentry® to authenticate the user.

TURing: A 10-digit code is presented in the form of a rectangular image in the user’s web browser. The user then takes from it the numbers represented by their PIN. Example: If their PIN is 1370, then they simply take the 1st, 3rd, 7th, and 10th character from the presented image.

PICpad is an authentication factor that transcends the usual options for language diversifi cation of both employees and customers. Using the same principles as PINpad®, PICpad displays symbols instead of numbers, providing a coherent meaning in multi-national environments

  • AuthControl Mobile:

OTC: Each time you are challenged to authenticate, simply use the OTC displayed in the App. As there are 99 codes, the OTC function is versatile enough to be used offline. Once the code has been entered, you will be granted access to your application.

PUSH: Simply by pressing a button in the mobile app you can confi rm authentication with the notifi cation sent directly to your
mobile. Deploy Swivel One Touch® functionality quickly with minimal confi guration required.

OATH soft token – is a time-based token counting from 0 to 60, similar to the traditional hardware token used to access applications though the VPN. The OATH compliant soft token provides the user with a six digit code to authenticate.

  • Mobile: SMS – to protect the OTC (through SMS) from fraudulent interception, the SMS is protected by PINsafe®. This means the SMS contains a security string of two alphanumerical sequences, and when combined with the user’s PIN provides their OTC.
  • AuthControl Voice – By calling the user, AuthControl Voice vocalises either a one-time code (OTC) or a PUSH notifi cation (YES or NO) to authenticate access to applications. The OTC delivered vocally over the telephone is then typed into the window upon request
  • Hardware token – The hardware token provides users with a one-time code (OTC) so they can securely access their application. Every time the button on the hardware token is pressed, it provides a new code, ensuring unauthorised access is prevented.
  • Biometrics: fingerprint – Fingerprint recognition is available for AuthControl Credential® Provider using the Windows 10 biometric framework and the NITGEN fingerprint access controller. Users can authenticate using the NITGEN fingerprint controller or their embedded fingerprint reader in their laptop.

 

AuthControl Sentry® is one of the most flexible solutions on the market, integrating with hundreds of applications and appliance software through RADIUS, ADFS, SAML and our own proprietary API – AgentXML. Whether you need to access Salesforce, authenticating with the mobile app, or logging into Windows Credential Provider using an image authenticator, AuthControl Sentry® supports an extensive range of applications and devices, providing the flexibility and effi ciency required for seamless authentication throughout the entire organisation.

 

 

Want to know more? Contact Us!
Use our security questionnaire!