ATLANTA--(AllPayNews)--July 17, 2006--
Identity 2.5 provides greater enterprise scalability, in-depth reporting, enhanced access control policy, and includes expanded driver coverage for Citrix, Intel Mac, and Microsoft Terminal Services
Trusted Network Technologies, Inc. (TNT), a leading developer of identity audit and access control solutions, today announced the release of Identity(TM) 2.5, its innovative software and appliance solution that allows organizations to see, control and prove who's doing what with any server or application, anytime. Identity 2.5 provides greater enterprise scalability for environments of 100,000 users and more granular auditing and reporting. The 2.5 release also enables Citrix Presentation Server, Microsoft Terminal Services and Intel Mac users to incorporate an identity solution that strengthens data security and simplifies audit while reducing the cost of managing users.
"We recently installed Identity 2.5 to help close a vulnerability for our remote access clients. We were impressed at how quickly we could understand exactly what was going on with our network and user traffic. Within minutes we were able to see the network assets that should be tightly controlled with the Trusted Networks Technologies product instead of relying solely upon IP," said Jeff Williams, IT manager for the California State Association of Counties. "With what we're already seeing, we plan to run Identity in audit mode for a few weeks and then apply policies for greater control. The easy to understand audit feature is like hiring a good security consultant, clearly showing us where problems exist."
"The 2.5 Identity release incorporates enhancements based on the business and IT requirements of our customers. For many of our enterprise customers, Citrix Presentation Server and Microsoft Terminal Services play an integral role in their environment," said Wain Kellum, president and CEO of Trusted Network Technologies. "With the extended Identity Driver capabilities, they can gain greater visibility and control in these thin client environments by quickly and easily locking down access to their organization's critical infrastructure to only those identified users. And all of this is completely transparent to the user."
Some of the specific capabilities delivered by 2.5 features include:
-- Increased Enterprise Scalability: User and device auto-registration, integrated trusted networks, and management and gateway components enable larger-scale and cross-departmental deployments for over 100,000 users.
-- Expanded Identity Driver Coverage: Identity enables identity-based audit and control for users authenticated to Citrix Presentation Server or Microsoft Terminal Services. In addition to its Identity Drivers for Mac OS X releases 10.2, 10.3, and 10.4, Identity also fully supports Intel-based and PowerPC Mac end users. This builds upon existing Windows and Linux support.
-- Updated Identity Support: Directory wizard ensures rapid import of user and group information for policy definition, role management and audit configuration. Identity supports multiple directories through automated integration with Distinguished Names (DNs), allows broader name support via Fully Qualified User Name (FQUN), and provides for alternative identity import through CSV and Lightweight Directory Interchange Format (LDIF) files.
-- Enhanced Auditing Capabilities: Log report granularity has been extended to include user, group, device, network, server or application. Workstation registration and automated reporting has also been enhanced.
"Regulations are forcing organizations to do what they should have been doing all along -- writing applications with a strong access control infrastructure, having business-level ownership of access request approvals, reviewing privileges/entitlements regularly, and monitoring real-time access events," said Roberta J. Witty, Gartner research VP. "Reporting on access assigned to users will remain a need in information security and compliance/risk management programs -- it isn't going away. Identity management project managers in regulated industries should look at implementing a repeatable process to deliver identity management compliance reports and products with strong reporting and attestation capabilities. The cost savings to the enterprise of automating this process can be quite high."
TNT's Identity appliance and software solution uniquely and unalterably identifies users and endpoints while dynamically and transparently adding identity credentials to network packets after authentication, allowing for identity-based access control and audit capabilities across the entire IT environment. This process establishes pervasive identity for every user, workstation, and server in the enterprise. There are three major components to an Identity deployment: Identity Driver, I-Gateway, and I-Manager. The Identity Driver embeds the authenticated user ID and a system ID into the initiating packet and establishes machine identity transparently, with no end user involvement. The I-Gateway appliance sits between users and critical assets, enforcing policies at wire speed based on the unique user identities in the packets, while I-Manager provides central system management and clear, customizable reports.
Identity 2.5 is currently available. Pricing starts at $15,000.
About Trusted Network Technologies, Inc.
TNT's identity audit and control solutions let companies see, control and prove who's interacting with any server or application, from what computer, and when. Colleges and universities, banks, healthcare providers, government agencies and others rely on TNT solutions to ensure appropriate access for trusted users and computers, safeguard sensitive data, verify policy compliance, and speed up audit data gathering. TNT solutions are low cost, fast to deploy, easy to manage and provide comprehensive visibility and control of interactions among all users, computers, groups, and specific assets and applications. For more information, visit www.trustednetworktech.com or call 888-566-9143.
Trusted Network Technologies
Rob Ciampa, 678-397-0331
Connect Public Relations
Pamela Brubaker, 801-373-7888