• Home
  • Events Calendar
  • Blueprint Guidelines
  • Privacy Policy
  • Subscribe to Daily Newsletter
  • NextGenInfra.io
No Result
View All Result
Converge Digest
Sunday, April 19, 2026
  • Home
  • Events Calendar
  • Blueprint Guidelines
  • Privacy Policy
  • Subscribe to Daily Newsletter
  • NextGenInfra.io
No Result
View All Result
Converge Digest
No Result
View All Result

Home » Nevis Networks Develops Identity-Based Cloaking Technology

Nevis Networks Develops Identity-Based Cloaking Technology

July 29, 2007
in Uncategorized
A A

Nevis Networks announced a new secure “Cloaking” capability that enables security administrators to completely mask key network resources from specific users and user groups. The goal is to make network servers and application resources “invisible” to unauthorized users, thereby preventing unauthorized users from launching a range of malicious attacks, including denial of service (DoS), password cracking, and probing for open ports and vulnerabilities.

Nevis said its new cloaking technology is built on the foundation of its LANenforcer identity-based security appliance, which associates network packets with unique user IDs and the user’s group affiliation. This allows cloaking and access policies to be defined in simple, easy to manage rules aligned with organizational group definitions. Access policies can be designed to be extremely granular down to a particular application, or specific server.

For example, a user within an organization’s engineering department can be prevented from sending/receiving traffic to or from an HR application server. Unlike other access control technologies, it doesn’t matter where the engineering user accesses the network from, or how the LAN is segmented, or what workstation he uses. The policy for his role is enforced everywhere in the network. Unauthorized packets are dropped before ever reaching their destination, removing the need for mission critical servers and applications to defend themselves from potential intruders, who can still overwhelm systems with attack attempts.

http://www.nevisnetworks.com

Tags: AllPacket Systems
ShareTweetShare
Previous Post

Huawei Expands North American Executive Team

Next Post

FCC Sets Rules for 700 MHz Spectrum

Staff

Staff

Related Posts

Blueprint: Building wholesale networks with OTN
All

Blueprint: Building wholesale networks with OTN

December 20, 2022
Huawei and Orange achieve 157 Tbps over 120km fiber link

Huawei and Orange achieve 157 Tbps over 120km fiber link

December 20, 2022
Oracle opens cloud region in Chicago
All

Oracle opens cloud region in Chicago

December 20, 2022
BT trials C-RAN in Leeds
All

BT trials C-RAN in Leeds

December 19, 2022
BT to combine Enterprise and Global units to create BT Business

BT to combine Enterprise and Global units to create BT Business

December 19, 2022
euNetworks appoints Stephanie Lynch-Habib to President

euNetworks appoints Stephanie Lynch-Habib to President

December 19, 2022
Next Post

Hammerhead Secures $18 Million for MultiService Switching

Please login to join discussion

Categories

  • 5G / 6G / Wi-Fi
  • AI Infrastructure
  • All
  • Automotive Networking
  • Blueprints
  • Clouds and Carriers
  • Data Centers
  • Enterprise
  • Explainer
  • Feature
  • Financials
  • Last Mile / Middle Mile
  • Legal / Regulatory
  • Optical
  • Quantum
  • Research
  • Security
  • Semiconductors
  • Space
  • Start-ups
  • Subsea
  • Sustainability
  • Video
  • Webinars

Archives

Tags

5G All AT&T Australia AWS Blueprint columns BroadbandWireless Broadcom China Ciena Cisco Data Centers Dell'Oro Ericsson FCC Financial Financials Huawei Infinera Intel Japan Juniper Last Mile Last Mille LTE Mergers and Acquisitions Mobile NFV Nokia Optical Packet Systems PacketVoice People Regulatory Satellite SDN Service Providers Silicon Silicon Valley StandardsWatch Storage TTP UK Verizon Wi-Fi
Converge Digest

A private dossier for networking and telecoms

Follow Us

  • Home
  • Events Calendar
  • Blueprint Guidelines
  • Privacy Policy
  • Subscribe to Daily Newsletter
  • NextGenInfra.io

© 2025 Converge Digest - A private dossier for networking and telecoms.

No Result
View All Result
  • Home
  • Events Calendar
  • Blueprint Guidelines
  • Privacy Policy
  • Subscribe to Daily Newsletter
  • NextGenInfra.io

© 2025 Converge Digest - A private dossier for networking and telecoms.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.
Go to mobile version