Skip to content

Analyst Comments

Infonetics Research
We conducted this study to understand the trends, drivers, barriers and implementation plans of large organizations deploying NAC infrastructure. As the NAC market continues to mature, the majority of customers are choosing to deploy identity-based policy enforcement solutions to protect resources from within the network. This validates Nevis Networks’ inline appliance and secure switching approach.”
Jeff Wilson
Principal Analyst
Infonetics Research
Sinnott Wolach Technology Group
Nevis is reminiscent of much larger organizations that provide channel partners with very rich and comprehensive web-based training, which is like having a dedicated sales engineer on staff 24×7. In addition, the company provides us complete access to Nevis Labs, a world class threat detection and vulnerability research organization.
Jeff Wolach
CTO
Sinnott Wolach Technology Group
AccessIT Group
Nevis’ LANenforcer appliances and secure switches are transparently interoperable with existing network infrastructure elements, and provide a migration path for new initiatives such as Microsoft’s Network Access Protection (NAP). This means that channel partners can provide immediate solutions with long term value in a broad range of customer network infrastructures. This provides us with yet another selling advantage for our customers. Customers want solutions, not turf battles.
Joe Luciano
CEO
AccessIT Group
Forrester Research Inc.
Just deploying NAC as an endpoint security solution won’t guarantee long-term success; operations and security teams will still need to overcome NAC’s limitations. The next generation of client and network security will encompass multiple solutions, which we dub proactive endpoint risk management [PERM], defined as policy-based software technologies that manage risk by integrating endpoint security, access control, identity and configuration management.
Robert Whiteley
Senior Analyst, Enterprise Networking
Forrester Research Inc.
DPSciences
Nevis appliances and secure switches have proven to be the solution that helped us win new customer relationships where we hadn’t succeeded earlier. Nevis is a great fit for us, not only because of increasing customer demand for market leading identity-based access control and intelligent intrusion prevention, but due to our ability to build strategic relationships that combine Nevis’ technology with our own professional services. Because the Nevis systems provide granular visibility into a client’s network, we have the opportunity to help analyze areas of network vulnerability at the outset of an engagement. We guide clients to define role-based policies and enforcement procedures tailored to their business operations, and then assist our clients with phased system rollouts. These are significant value-added services that strengthen ties with our customers and position DPSciences as a trusted advisor.”
Steve Allen
Security Solutions Manager
DPSciences
Current Analysis
There are five key technologies enterprises should include in their NAC deployment strategy. The Nevis solution offers elements to support each of these requirements and differentiates itself through advanced persistent threat detection and containment.”
Joel Conover
Research Director, Enterprise Networks and Security
Current Analysis
Current Analysis
It’s very clear that many customers evaluating LAN security solutions are initially taking measured steps with targeted roll outs (e.g., single facility) that address immediate pain points. While the need for pre-and post connect access controls and continuous per user threat detection remains high, the nascent LAN security market is going to have to listen carefully to customers who are struggling with complexity.
Andrew Braunberg
Senior Analyst
Current Analysis
Yankee Group
What’s significant about solutions that effectively tie identification to policy based network rights at the point of authentication is that it effectively controls individual users across the entire spectrum of network connections.
Chris Liebert
Senior Analyst, Security Solutions & Services
Yankee Group
January 2006
Firms should marry reactive and proactive access technologies to build security directly into the network fabric.”
Is Your Network Safe For 3rd Party Access?
Forrester Research, Inc.
January 2006
Gartner Inc.
Ethernet switches with comprehensive NAC functionality represent the most significant change to LANs since Gigabit Ethernet was first introduced in the mid-1990s.”
S. Cramoysan, et al.
“Cool Vendors in Enterprise Communications, 2006”, 3/16/06
Gartner Inc.
Burton Group
Nevis’ approach provides both policy-based prevention of undesirable behaviors as well as better activity accountability through integrated logging and reporting. Overall the use of an integrated security appliance simplifies the network security architecture and reduces management overhead.”
Phil Schacter
Vice President and Group Service Director
Burton Group
Internet Research Group
The LANsecure architecture provides a high level of security, and its wireline speed allows it to do so transparently so that even latency-sensitive applications such as VoIP continue to operate normally.”
Peter Christy
Principal
Internet Research Group