Additional Info

CompanyBradford Networks
Websitehttp://www.bradfordnetworks.com
Company size (employees)50 to 99
Type of solutionSoftware

Overview

Thousands of companies are in the security space – each addressing a tiny slice of the bigger problem. Network Sentry has evolved beyond traditional NAC for endpoint visibility and access control to act as a centralized ‘brain’ – getting information from the largest breadth of technology partners, identifying the ‘who, what, where, when’, automating the access to information, quarantining suspect devices, and handling the triage and response for security teams. With the vulnerabilities exploding due to IoT and BYOD, and the need for centralized information for compliance in many industries – Network Sentry stands alone as a pivotal epicenter for the SOC and NOC alike.

Network Sentry’s strong NAC solution enables granular control over each device that attempts to connect to the network. It ensures devices meet the organization’s minimum security requirements and ensures users only have access to job-required areas. Network Sentry then continuously monitors all devices and activity to detect if a device falls out of compliance, at which time it can automatically quarantine the device within seconds. Network Sentry isolates suspicious, unauthorized, or authorized devices that may be compromised, in real-time.

Today, business is global and companies need to scale effortlessly. Network Sentry is the only solution that can cost-effectively scale with no need to ‘repeat’ hardware deployments. The single pane of glass view of global networks is how sophisticated enterprises remain secure and productive.

How we are different

- Network Sentry’s Integration Wizard enables the strongest security posture by gathering alerts and information from numerous best-of-breed security solutions to significantly improve threat detection and provide superior triage accuracy to transform analyst threat review cycles from months to minutes


- Network Sentry provides 100% visibility and control of all endpoint actions and acts as a compensating control for IoT, BYOD and other devices that have poor on-board security and present significant threats to the network


- Network Sentry checks every device both pre-connect and post-connect so it can automatically quarantine any threats in real-time, then deliver the accurately prioritized events, with all contextual information, to an analyst - saving hours to days triaging and researching events