Piercing network anonymity in real time

leichter_jerrold at emc.com leichter_jerrold at emc.com
Tue May 9 09:04:58 PDT 2006


eTelemetry Locate                                      [Image]

      Locate dynamically discovers, correlates and archives the
      person behind the IP address--"the people layer"--to expedite
      forensic investigations and help comply with SOX. It
      approaches the issue of how to match a name to a network
      device from the identity side, a change from 802.1x and NAC
      methodologies.

      The Locate appliance sits passively on the network and
      analyzes packets in real time to garner ID info from sources
      like Active Directory, IM and e-mail traffic, then associates
      this data with network information.

      Once Locate is populated, IT can disconnect an individual with
      one click at the switch port level, a powerful tool for
      enforcing policy and halting the spread of infections. You
      also can connect to an end user's computer without asking for
      an IP address, track assets dynamically, stay in sync with
      Active Directory and other LDAP directories automatically, and
      archive network activity for forensic investigations.
      etelemetry.com/pdf/Interop_finalist_final.pdf

 							-- Jerry


---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com

----- End forwarded message -----
--
Eugen* Leitl <a href="http://leitl.org">leitl</a> http://leitl.org
______________________________________________________________
ICBM: 48.07100, 11.36820            http://www.ativel.com
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE

[demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc]





More information about the cypherpunks-legacy mailing list