Authentication and Identity

When architecting any organization's security strategy, the ability to accurately identify both users and assets is critical to any security solution.   The process of authentication and role assignment is the precursor to both policy assignment and access control -- cornerstones to the fundamental concepts of a security architecture.  These policy controls should be implemented not only at the network edge where users first connect to the network, but also throughout the entire network as oart of a complete enterprise wide security architecture.

A complete Identity solution encompasses a complete group of Flexible Authentication (FlexAuth) methods, including IEEE 802.1X, Web Authentication (WebAuth), and MAC Authentication Bypass (MAB).  These authentication methods may either be enabled [or enforced] at the network edge and may leverage the network components themselves (Switches and Routers), or may instead leverage dedicated in-band hardware appliances.

More Information:

For more information on Authentication and Identity Products, Solutions and Priveon Implementation Services, please contact us.