IDENTITY TRACKING FEATURING IP-TO-ID
Resolve anonymous network identities to user ID instantly to solve real-time issues and aid after the fact investigation
For years, IT staff have been hampered by the inability to quickly find who is using a network IP address or hardware MAC address, both in real-time or when investigating historical data months or years after the fact.
While visibility has increased into IP-centric networks and protocols, user visibility has lagged far behind. Often IT staff are faced with real-time events where it is critical to identify the user and take action. Likewise as events are often investigated after the fact, knowing an issue created by 10.16.99.88 six months ago and 192.168.10.13 today are from the same user could be key to security investigations or network diagnostics.
Networking and security products can provide the "what" and "where" and IP-to-ID provides the "who" across all primary authentication points.
Leveraging IP-to-ID, ID-to-IP and MAC-to-IP to Deliver Identity Aware Networks
Whether the service is viewed as analogous to DNS, but for resolving users, not machines, to network address or caller ID for the network, the result is an identity aware network with unprecedented visibility.
IP-to-ID - Provides instant identity resolution allowing organizations to find out who is on the network with the unique ability to correlate an IP address to a user identity, instantly.
ID-to-IP - Provides additional information on where a user has logged in, showing all such information in a single view, vastly aiding security teams to pinpoint a user’s activity and network teams to correlate disparate events to a user.
MAC-to-IP - Ensures even with just a MAC address the machine can be traced back to a user account.
Historical Data - Information from historical data solves a problem that was near impossible in the past.
Actionable Identity - allows user quarantining in critical situations helps isolate issues and compliments existing security products.
Integrates with all leading data sources, from Directories and Operating systems to Syslog feeds or file based logs. This includes LDAP, Microsoft Active Directory, Firewalls, VPNs and more.
The Power of Actionable Identity
Actionable Identity is a powerful new concept illustrating the power of the Unified Identity Management solution.
Using IP-to-ID to identify a malicious user, an administrator can instantly disable the user account from multiple back-end systems with one click due to the power within the User Provisioning core module.
For the first time this ensures the source can be effectively quarantined quickly, rather than creating the same issue by moving to another machine, thus augmenting existing network security devices.
The ID Series has also provided an API in XML or C that can allow organizations and network or security vendors to access the current or historical identity information.This allows the information to be available directly in partner applications or even internal customer applications.
The XML API is especially suited for rapid integration that could happen in a matter of a few hours. For more information please click on the partner program and partner integration links below.
Key Benefits at a Glance
A10 provides a fast, accessible, single location for user IP-to-ID identification and user system usage tracking
Save hours and improve compliance auditing scores, in real time and years after the fact
IP-to-ID user ID resolution in seconds from a simple Web interface or embedded in a partner application
ID-to-IP translation to show all devices a user has logged into
MAC-to-IP translation ensures even with just a MAC address an identity can be resolved
IP and MAC tracking supported from almost any authentication source or network device
Provides the complete identity picture unlike NAC (Network Address Control) systems. The ID Series does not operate in-line, and does not miss a single event on connected system.
At Smart City we have over 3,000 wired and wireless network devices that authenticate thousands of users from convention centers all over the US. We chose A10's IDsentrie identity management appliance to replace our existing solution as it is capable of handling a vast number of authentications per second. IDsentrie's RADIUS authentication module delivers scalability, redundancy and reliability, both for incoming requests from network devices and to multiple back-end data stores. We also value the timely support and integration of feature requests from the A10 team - it helps us provide superior services in the event industry.
-Felix Windt, Network Administrator for Smart City
IDsentrie is a strong identity management product that is quick to deploy and easy to use. Its IP-to-ID reporting tool is unique and can easily provide justification for purchasing the product based on the amount of time that can be saved by automating a very manual analysis process.
-Mandy Andress, President, ArcSec Technologies
NetworkWorld, Clear Choice Review, 12/11/2006
IDC believes that identity & access management has emerged as a key component of a compliance platform.
...suites from major vendors are priced five times, if not 25 times, the price of the IDsentrie.
The 451 Group