Client |
Description |
Nevis Solution |
StemCells, Inc.

› Read the case study |
Centralized identity-based access control for employees and 3rd parties |
- 20% savings compared to to alternative combined access switch-IPS solutions
- Identity-based access control providing employees and visitors with appropriate access to resources
- Granular security policies enforced per port/per user
|
Berding & Weil, LLP

› Read the case study |
Easy to deploy access control for 3rd parties using the corporate network |
- Identity-based access control to ensure visitors have appropriate access to resources
- Fast, accurate threat detection (firewall, anomaly detection, signature matching
- Microsecond quarantine, shutting down threats at the source
|
Upper Canada
School District Board

› Read the case study |
Safe network access control and threat detection for +100 schools and 40,000 users |
- Endpoint integrity verification to ensure endpoints with updated s/w can access the network
- Appropriate access to network resources for students, faculty and administrators
- Detection and quarantine of threats in real-time to stop their spread
|
South Orange County Community College District

› Read the case study |
Pre- & Post-connect access controls. The ability to continuously monitor & report on user activity throughout a network session |
- Endpoint integrity verification for all 40,000 users
- Provisioning appropriate access control for students, faculty and administrators
- Identify & Quarantine malware in real-time
|
Patni Computer Systems Ltd.

› Read the case study |
Integrated Access Control for Guests, Contractors & Visitors |
- Allow guests and contractors onto the network with restricted access
- Provide an audit trail to identify activity by user on guest access points
- Prevent any type of infection spreading into the corporate network
- An out of box deployment solution
- Reduce day to day maintenance of creating access policies
- Detect and contain malicious activities and protect the corporate network
|
Aptuit
 |
Employee, guest and contractor authorization, pre and post connect access control |
- LANenforcer 1048s providing employee and non-employee access control in the meeting areas
- LANenforcer 2024s providing employee and non-employee pre & post connect NAC throughout the network
- End-point asset ‘cloaking’ to ensure version control for FDA certification
|
Centrality Communications
 |
Per-port LAN security and unauthorized user access control to sensitive assets and intellectual property |
- Global deployment of LANenforcer 1048s to control employee access and to secure guests/meeting rooms
|
Government Employees Health Association (GEHA)
 |
Needed a secure network access control solution for external users accessing government healthcare program information. |
- LANenforcer 2024 High Availabilty bundle for access policy enforcement and malware containment
|
Keystone Automotive
 |
Enterprise-wide access control and identity-based policy enforcement to critical resources |
- LANsight and LANenforcer 2024s providing employee and non-employee access control
|
KLA-Tencor
 |
Access control to enterprise systems, including access control enforcement in joint collaboration initiatives with partners, and malware containment |
- LANenforcer 1048s providing per-port security and identity-based access controls for key employees, partners and conference room protection
|
Raytheon
 |
Secure employee access |
- LANenforcer 2024s providing identity-based access control and threat prevention
|
Reconnex
 |
Per-port LAN security |
- LANenforcer 1048 providing guest and contractor access in controlled areas
|
Satyam
 |
Access control for remote users |
- LANenforcer 2024 providing identity-based access control for VPN users across the enterprise
|
Yardi
 |
Global NAC and identity-based policy enforcement system |
- LANenforcer 2024 bundles that provide threat protection and identity-based access control.
|
Insilica
 |
Pre- & post-connect access controls with the ability to provide rapid threat response and containment |
- LANenforcer 2024’s providing protection and access control for users in development centers around the globe
- Segregation of project resources by role
- Protection of intellectual property
- Malware protection
- Simple user management and provisioning
|