SolarWinds UDT Discovers Rogue Devices Invading Enterprise Networks
REVIEW: SolarWinds User Device Tracker helps enterprises discover and keep track of all the devices that are constantly connected to their networks.
Enterprise networks are experiencing a storm of connectivity, fueled by remote access, BYOD (bring-your-own-device) policies, virtual clients and the multitude of diverse endpoints demanding access to the network. That situation has created challenges for the harried IT manager who needs to know the who and what that is trying to connect to the network to keep the enterprise security. It all comes down to a simple question: If a network manager is unaware of a device, how can that manager control the connectivity to that device? Obviously, there are all sorts of technologies that can be deployed to validate devices, their users and control access. But those same technologies often come up short when it comes to detecting new devices or managing those that may only occasionally connect. SolarWinds has come up with a way to address those shortcomings with its UDT (User Device Tracker), an application that starts at $1,795 and delivers the ability to discover, identify and control devices as they connect to the network. The product works hand in hand with the network's switching infrastructure to locate devices and control network access.- Network Device Tracking: UDT brings to the table the ability to discover devices and track when and where those devices connect to the network, and stores all the pertinent information about those devices, connections and history.
- Network User Tracking: The product is able to track users, as well as their devices, keeping an eye on who is connecting to the network, from where and on what device. That proves useful for vetting authorized users and tracking mobile access.
- Discover, Map and Monitor Switch Ports: Along with tracking and monitoring users/devices, UDT also can detect what switch ports are on the network, and correlate the usage of those ports with devices and users. What’s more, UDT can create logical maps of the switches and associated ports, as well as provide control over the ports.








0 Comments for "SolarWinds UDT Discovers Rogue Devices Invading Enterprise Networks"