Piercing network anonymity in real time
leichter_jerrold at emc.com
leichter_jerrold at emc.com
Tue May 9 09:04:58 PDT 2006
eTelemetry Locate [Image]
Locate dynamically discovers, correlates and archives the
person behind the IP address--"the people layer"--to expedite
forensic investigations and help comply with SOX. It
approaches the issue of how to match a name to a network
device from the identity side, a change from 802.1x and NAC
methodologies.
The Locate appliance sits passively on the network and
analyzes packets in real time to garner ID info from sources
like Active Directory, IM and e-mail traffic, then associates
this data with network information.
Once Locate is populated, IT can disconnect an individual with
one click at the switch port level, a powerful tool for
enforcing policy and halting the spread of infections. You
also can connect to an end user's computer without asking for
an IP address, track assets dynamically, stay in sync with
Active Directory and other LDAP directories automatically, and
archive network activity for forensic investigations.
etelemetry.com/pdf/Interop_finalist_final.pdf
-- Jerry
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com
----- End forwarded message -----
--
Eugen* Leitl <a href="http://leitl.org">leitl</a> http://leitl.org
______________________________________________________________
ICBM: 48.07100, 11.36820 http://www.ativel.com
8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
[demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc]
More information about the cypherpunks-legacy
mailing list