24
C
ONFIGURING
SODA E
NDPOINT
S
ECURITY
FOR
A
WX S
WITCH
Sygate On-Demand (SODA) is an endpoint security solution that allows
enterprises to enforce security policies on client devices without having to
install any special software on the client machines. MSS can be
configured to run SODA security checks on users’ machines as a
requirement for gaining access to the network.
About SODA
Endpoint Security
The SODA endpoint security solution consists of six modules that provide
on-demand security:
Virtual Desktop
– Protects confidential data by virtualizing the
desktop, applications, file-system, registry, printing, removable media,
and copy/paste functions. All data is encrypted on-the-fly and can
optionally be erased upon session termination. The virtual desktop is
isolated from the normal desktop, protecting the session from
previous infection.
Host Integrity
– Tests the security of the desktop to determine how
much access to network resources the device should be granted. Host
integrity checks include:
Ensuring that an anti-virus product is running with up-to-date virus
definitions
Ensuring that a personal firewall is active
Checking that service pack levels are met
Ensuring that critical patches are installed
Custom checks can be implemented based on the existence of specific
registry keys/values, applications, files, or operating system platforms.
Network access can also be prevented based on the existence of
specific processes.
Summary of Contents for 3CRWX120695A
Page 138: ...138 CHAPTER 6 CONFIGURING AND MANAGING IP INTERFACES AND SERVICES ...
Page 272: ...272 CHAPTER 11 CONFIGURING RF LOAD BALANCING FOR MAPS ...
Page 310: ...310 CHAPTER 13 CONFIGURING USER ENCRYPTION ...
Page 322: ...322 CHAPTER 14 CONFIGURING RF AUTO TUNING ...
Page 350: ...350 CHAPTER 16 CONFIGURING QUALITY OF SERVICE ...
Page 368: ...368 CHAPTER 17 CONFIGURING AND MANAGING SPANNING TREE PROTOCOL ...
Page 412: ...412 CHAPTER 19 CONFIGURING AND MANAGING SECURITY ACLS ...
Page 518: ...518 CHAPTER 21 CONFIGURING AAA FOR NETWORK USERS ...
Page 530: ...530 CHAPTER 22 CONFIGURING COMMUNICATION WITH RADIUS ...
Page 542: ...542 CHAPTER 23 MANAGING 802 1X ON THE WX SWITCH ...
Page 598: ...598 CHAPTER 26 ROGUE DETECTION AND COUNTERMEASURES ...
Page 706: ...706 GLOSSARY ...