• CyberGatekeeper Server Overview The division between the trusted network and untrusted network has traditionally been a fixed perimeter.
• This concept is no longer adequate because systems routinely cross between untrusted and trusted networks.
• An infected system can quickly infect other systems on the network after catching a virus on the Internet.
• The corporate LAN is especially vulnerable because network resources are more open and prevalent.
• To remain safe and productive, the network must ensure that all systems are compliant with corporate security policies without impeding workflow.
• CyberGatekeeper Server Appliance CyberGatekeeper Server hardens the existing network by only allowing access to authorized devices and reporting and blocking rogue endpoints.
• Non-compliant endpoints are quarantined until remediation brings them back into compliance.
• The CyberGatekeeper Server appliance supports multiple methods for managing access to the network.
• NAC methods include: the new Dynamic NAC enforcement which requires no changes to infrastructure or equipment; 802.1x NAC which uses VLANs; and in-line NAC which uses a bridge to filter traffic in-line.
• Capabilities provided by CyberGatekeeper Server include: Authentication using 802.1x or Windows domains Automatic and interactive remediation Continuous validation of endpoint compliance Centralized policy updates and configuration NAC quarantine methods include Dynamic NAC, 802.1x, and in-line filtering.