Computer Associates International, Inc. (CA) announced that it has joined the Network Admission Control (NAC) program and is integrating the Cisco Trust Agent with its eTrust PestPatrol Anti-Spyware and eTrust Antivirus solutions.  When the products become generally available in November, CA will be the first security software vendor to provide both NAC-compliant virus and spyware protection.

By integrating with the Cisco Trust Agent, CA's eTrust solutions further safeguard enterprise environments by helping ensure that only systems in compliance with corporate security policies can connect to the network - thereby preventing individual non-compliant systems from compromising other critical computing resources.

Network Admission Control is a Cisco-sponsored industry initiative that uses network infrastructure to enforce security policy compliance on all networked resources.  Using NAC, organizations can identify noncompliant devices and deny them access, place them in a quarantined area, and/or give them restricted access to computing resources.  NAC is part of the Cisco Self-Defending Network strategy to increase network intelligence in order to enable the network to automatically identify, prevent and adapt to security threats.

eTrust Antivirus provides comprehensive virus protection from the perimeter to the PDA, automating administrative tasks and signature updates to ensure continuous, up-to-the-minute protection from emerging malware threats.  eTrust PestPatrol Anti-Spyware provides essential additional protection against spyware, adware, denial-of-service attacks and other "backdoor" threats.  Together, these two CA solutions provide customers with uniquely comprehensive safeguards against the Internet-borne threats that can destroy data, undermine productivity and wreak havoc with IT departments.

CA will continue working with Cisco to further utilize the NAC framework and related technologies - integrating other eTrust threat management solutions with the framework to implement and automate multiple tiers of security across the enterprise.


Register or login for access to this item and much more

All Information Management content is archived after seven days.

Community members receive:
  • All recent and archived articles
  • Conference offers and updates
  • A full menu of enewsletter options
  • Web seminars, white papers, ebooks

Don't have an account? Register for Free Unlimited Access