Let RedempSec show you just how vulnerable you are. 9 1 3 . 3 5 6 . 9 2 2 2
Let RedempSec show you just how vulnerable you are. 9 1 3 . 3 5 6 . 9 2 2 2
Let RedempSec security experts identify all assets connecting to your access layer. Regardless if it is an IP camera, computer, IoT device, PDU, or network component, we guarantee every asset is authenticated and authorized before participating on the network. RedempSec moves quickly through the crawl, walk, and run phases, for a good reason.
Time is critical, so getting to enforcement mode is extremity important, and we accomplish this without impacting the business. A simple explanation of (MAB) MAC Authentication Bypass is a technology that allows you to authenticate and authorized network nodes based on their MAC address. We use MAB in situations where there are devices that don't have an 802.1x client (like printers).
MAB allows you to have some level of control over the switch ports where these devices are connected. IEEE 802.1x is a port-based authentication mechanism.
802.1x authentication involves three parties: a supplicant, an authenticator, and an authentication server. The supplicant is a client device such as a laptop) that wishes to attach to the LAN/WLAN. The term 'supplicant' is also used interchangeably to refer to the software running on the client that provides credentials to the authenticator.
The authenticator is a network device that provides a data link between the client and the network and can allow or block network traffic between the two, such as an Ethernet switch or wireless access point. The authentication server is typically a trusted server that can receive and respond to requests for network access and can tell the authenticator if the connection is to be allowed, and various settings that should apply to that client's context or environment.
Authentication servers typically run software supporting the RADIUS and EAP protocols. In some cases, the authentication server software may be running on the authenticator hardware.
The authenticator acts like a security guard to a protected network. The supplicant (i.e., client device) is not allowed access through the authenticator to the protected side of the system until the supplicant's identity has been validated and authorized.
With 802.1x port-based authentication, the supplicant must initially provide the required credentials to the authenticator - these can be specified in advance by the network administrator and could include a user name/password or a permitted digital certificate. The authenticator forwards these credentials to the authentication server to decide granted access.
If the authentication server determines the credentials are valid, it informs the authenticator, which in turn allows the supplicant (client device) to access resources located on the protected side of the network. RedempSec has experts in the Cisco ISE technology and is ready to ensure authenticated assets before accessing your infrastructure.
© 2019 RedempSec, Inc. - All Rights Reserved.
Unauthorized duplication strictly prohibited.
RedempSec - A Premiere CYBERSECURITY enterprise.