Intelli7 Introduces First Identity-Based Network Management Solution that Translates Network Traffic into User Activity


Breakthrough Network Event Translation(TM) Technology Gives Organizations the Power to Identify, Analyze and Enforce What Users Do on Their Networks

WASHINGTON, 32nd Annual Computer Security Institute, Booth #1902, Nov. 14 / -- Intelli7, Inc., today announced the debut of its Intelli7 G1 identity-based network management appliance, one in a family of products that enable enterprises to implement identity-driven network security control through existing network infrastructure. With Intelli7, G1 enterprises can monitor, manage, and audit all network activity based on the unique identity of a user or network resource, enabling fast resolution of network incidents, preventing unauthorized access to network resources, and ensuring maximum service availability.

As organizations open their networks to make applications and data available to a wide variety of internal and external constituents, understanding and controlling user activity is increasingly important. Identity is used to control access to the network at the entry points, but the internal network is generally not controlled, and once authenticated, users have network-level access to any resource, regardless of whether they can actually log in to the resource.

"Organizations are realizing that internal networks are no longer isolated islands -- employees are accessing networks remotely and about a third of all users on a typical network are not employees and therefore not under organizational control," said Intelli7 Founder and Chief Executive Officer Phillip Zakas. "IT executives have repeatedly told us the lack of visibility into their internal networks and the complexity of translating user-based controls into Ethernet are major problems. The Intelli7 G1 appliance gives IT staff the real-time visibility they need to understand what users are doing on the network and the simplicity of identity-based control to ensure that users are only engaged in authorized activity."

Perimeter security solutions cannot adequately address this problem because they lack performance capabilities -- internal networks operate at higher speeds -- and the flexibility to accommodate dynamic IP address allocation that is typical on internal networks. If an incident needs to be resolved, or an internal control verified, IT staff must engage in a time-consuming process of reconciling the IP address back to a user name, which reduces productivity. This lack of transparency and user control exposes internal networks to unauthorized activity and the introduction of threats that can impact network integrity and service reliability.

Intelli7 G1 delivers the following benefits:

Translate Network Traffic into User Activity

Intelli7 G1 leverages existing customer authentication and directory services to associate the name of the user or resource with the network traffic being generated to create a user-based view of network activity. Ethernet information is translated into easy to understand information about who accessed what network resource, when it was accessed, how it was accessed, and where on the network. This approach eliminates the complex and time consuming process of resolving IP addresses to user names, enabling faster incident response and creating instant user accountability for policy violations. This user-centric perspective also provides a new, network-based view of how organizational processes actually work that can be used to improve internal controls.

Identity-based control of assets, applications, and data

Intelli7 G1 opens a real-time window into network traffic, accurately identifying network and application protocols, application handshakes, sensitive data, and other information, to create a user specific, fully-contextualized picture of network activity. This is actionable information that can be used to identify legitimate and rogue application traffic, locate data stores, and troubleshoot network problems. Intelli7 can also identify, track, and secure organization specific confidential information on the wire in real-time. Actual data on network events and incidents are continuously and automatically captured, creating centralized log of per user network activity that simplifies compliance audits and supports Sarbanes-Oxley, HIPAA, PCI, and other regulatory initiatives.

Enforce Security Rules and Policies Directly in the Network

Intelli7 G1 monitors network traffic for user-specific compliance with role-based policies, either alerting on violations or enforcing security rules and policies on every packet to stop unauthorized access or use of applications, data, or servers. If a user is not authorized to access a resource, Intelli7 denies network-level connectivity, effectively making the resource invisible. This approach enables an administrator to tightly manage users and groups and simplifies network management by moving control directly into the network, eliminating the need to reconfigure network hardware.

Breakthrough Network Event Translation Platform

Intelli7's patent-pending Network Event Translation(TM) platform analyzes and enforces role-based policies on every packet at multi-gigabit speeds with fractional millisecond latency. This innovative architecture combines multi-pass deep packet inspection (Layers 2-7) with analytics that evaluate two-way application handshakes to contextualize user activity. Intelli7 recognizes applications without resorting to inference and identifies applications or exploits that are tunneled in otherwise permitted applications. This combination provides dramatically better analytic accuracy. Sensors can support up to 20,000 users and an unlimited number of connections.

Easy to Deploy and Manage

Intelli7 G1 sensor appliances can be installed on any network segment (LAN, server farm, behind a VPN) transparently inline (analyze, alert, enforce) or on a SPAN port or network tap (analyze, alert), without changes to network architecture. The Intelli7 Management System provides IT with a centralized, easy to use, web-based control panel for monitoring user activity and security incidents. The management system supports role-based administration and leverages existing authentication and directory services to collect identity attributes, including group memberships, which allow policies to be defined one time and automatically inherited at login by all group members. Fully-contextualized event information can be passed to a security or network console for analysis or off-loaded to a forensic archive.

Pricing/Availability

Intelli7 G1 appliances are flat priced, so there are no per user fees. Systems start at $30,000. Intelli7 G1 is now available market-wide.

About Intelli7, Inc.

Intelli7 secures enterprise and government networks with a scalable identity-based network management solution that enables rapid resolution of network incidents, prevents unauthorized network actions and ensures maximum service availability. Based in Washington DC, Intelli7's G1 appliance translates network traffic into user activities (who, what, how, when, where) to enable identity-based control of network resources and enforcement of security controls directly in the network. Intelli7 enables a new level of identity-based visibility and policy enforcement through the existing network infrastructure. For more information visit www.intelli7.com.

Press/Analyst Contact:
Jim Engineer
e-Rainmaker PR for Intelli7
4320 Winfield Road, Suite 200
Warrenville, IL 60555
jim.engineer@e-rainmaker.com
Office: 630.836.8556
Mobile: 630.728.1387

Source: Intelli7, Inc.

CONTACT: Jim Engineer of e-Rainmaker PR , +1-630-836-8556, or mobile,
+1-630-728-1387, or jim.engineer@e-rainmaker.com, for Intelli7

Web site: www.intelli7.com/

All Topics