Skip to content


Today’s networks are business-enabling – network infrastructure enables sales operations, order fulfillment, customer service, partnership building, and internal communications. Without network availability and broad network access, enterprises today simply cannot effectively function. LAN security preserves network reliability while permitting broad, secure and controlled access for all types of users – employees, guests and contractors. Nevis’ vision to embed security into the fabric of the LAN infrastructure has placed the company at the forefront in delivery of innovative solutions to protect corporate LANs from availability and security risks associated with guest access, inside attacks and malicious code exposures. Additionally, Nevis’ solution delivers comprehensive visibility into all security events and user activity required by many regulatory standards.


Nevis understands that comprehensive LAN security requires continuous protection and control; this includes:

  • Granular user identity-based access control policy enforcement to control user activity
  • Continuous threat detection and containment before, during and after admission to the network
  • Protection against access by noncompliant endpoints (NAC)
  • Greater user activity visibility to demonstrate regulatory compliance and enforce accountability

Nevis Networks LAN Security Solutions

Mitigate the Risk of Endpoint Vulnerabilities 
Endpoint devices accessing the enterprise network that are not kept updated with the latest anti-virus, anti-spyware and OS patches can impose serious security risks. Some users may even shut off desktop security applications that they perceive impede the performance of their applications — again raising the possibility of introducing infections into the network.
>> more

Provision Appropriate Network Access for Non-Employees 
With enterprises opening network access to non-employees such as contractors, partners, customers and guests, the need to control their access to network resources and contain any threats being introduced by them onto the LAN are significant challenge facing many IT organizations today.
>> more

Control Access to Sensitive & Confidential Data  
Protection of enterprise data assets is best controlled through granular identity-based access control policy enforcement – before, during, and after a user is granted access to the network. Critical data resides in multiple places and is accessed by various users in different locations, so having per-user, location-independent policies is essential. Additionally, persistent access control policy enforcement should prevent unauthorized users from even “seeing” network, system and application resources that are not necessary for their specific job responsibilities.
>> more

Reduce cost & Complexity of Risk Management 
Malware threats can cause extensive damage to data, disrupt business operations and impact profitability. The ability to contain threats within the LAN — with precision and lightening speed — is essential to protecting network availability. Threats can be introduced at any point during a user’s session – via media such as USB drives – even after an endpoint has been checked for the presence of anti-virus, anti-spyware and OS updates.
>> more

Tighter Control & Visibility of Regulatory Compliance 
Regardless of industry vertical or company size, regulations govern most businesses and impose requirements to ensure adequate protection of sensitive information. Adequate protection includes limiting data access to only appropriate individuals, monitoring all access to verify policy compliance and recording access to demonstrate due diligence.
>> more