What Makes TES Different?
Unlike other proposed solutions, Enterasys designed TES as an open standards-based solution for multi-vendor environments. Other endpoint security concepts are proprietary and would require users to deploy a single vendor’s applications on every PC. With TES, enterprises can leverage existing desktop security software, and, most importantly, it is available now. TES is based on granular user and port-level policy control technologies, rather than on a group-based VLAN containment approach. Implementing VLAN configuration puts added strain on overburdened IT resources. In addition, other vendors’ security proposals would apply only to routers, a significant limit to the effectiveness of endpoint security efforts since enterprise users most commonly access corporate networks via switch ports and wireless access points. “”With this latest addition to its Secure Networks solutions portfolio, Enterasys demonstrates vision with an integrated endpoint solution,”” said Charles Kolodgy, researc