According to a release,
The company noted that in today's mobile economy, security has become vital for businesses and organizations as more and more employees are using personal devices in the office. BYOD (bring your own device) and mobile device management are no longer new trends but rather common practice, and with an increasing variety of IP- based equipment sending data over networks, companies need to ensure that they have solutions in place so that their internal data is managed and secure.
"The shift toward a BYOD culture in today's workplace has resulted in employees bringing more and more personal devices and personal applications to the office to meet their specific needs and increase productivity," said
"Many companies need a way to secure their networks from the inside out without the headache of high costs or extreme technical complexity," said
Key features of iNetSec
-Endpoint Visibility & Device Discovery this access control functionality recognizes all devices on a business network, both wired and wireless from laptops and mobile phones to tablets and printers so companies can prevent illegal access and minimize threats.
-Threat Prevention & Security the Layer 7 IPS functionality gives control over application usage within the company's network, in order to prevent hazardous activities internally.
-Non-Intrusive Device Detection this approach ensures there is no network disruption while conducting device monitoring:
-Out of band technology does not reduce network performance
-Agentless technology means there is no software to install on devices and no software updates to manage on diverse devices
-Simple Deployment deploy in both single-site and multi-site environments the installation process typically takes less than 2 hours.
-Centralized Web-Based Policy Management stay organized and coordinated with device management:
-Authorization workflow and device registration process
-Device classification on the network
-Automated new device approval process
-Whitelist/blacklist security policy management
-Create network access policies by group segments
-Reporting, Analytics, and Alerts use simple dashboard reporting tools to use time effectively.
-Scalability support growing infrastructures and multi segment networks with 3,000 endpoints available per single appliance.
((Comments on this story may be sent to email@example.com))
According to a release,