Adaptive Network Security Solutions from Vernier Networks Make the Grade with More Than 100 Universities and Colleges Around the Globe

Share Article

Vernier NetworksÂ? adaptive network security solutions are protecting more than 100 higher education networks serving over 2 million students from worms and viruses likely to be launched as students return to campus.

Vernier Networks®,, a network security solution & wireless LAN security solution provider for complete worm and virus protection, recently announced that more than 100 universities have selected the company’s Adaptive Security Platform (ASP) to defend their networks from worms and viruses that are likely to be unleashed by infected laptops as students start classes in the fall. Campuses that have deployed the Vernier adaptive network security solution include Virginia-based George Mason University, the University of Miami and the University of Texas at Arlington.

The Vernier ASP is the industry’s first adaptive network security solution that enables educational institutions to assure continuous, secure network availability on their wired and wireless networks. Vernier’s multi-layered solution proactively protects networks from increasingly complex attacks, while continually adapting network security policy to protect against future threats. Vernier’s Trusted Network Admission process assures that only clean devices can access the network through the industry’s best network admission capabilities, including vulnerability assessment and patch management. Vernier’s Trusted Network Outbreak Control stops the proliferation of worms and viruses in the network through surgical outbreak control.

George Mason University is a public institution serving more than 28,000 students across three locations in northern Virginia. Last fall, some of the computers that students brought to campus were infected with the Welchia worm. Once unleashed on the university network, the worm spread from computer to computer and flooded the network with traffic. To remediate the attack, the IT department was forced to shut down the dormitory network and then spend 2,000 staff hours inspecting and repairing 500 computers and restoring network services.

“After last fall’s outbreak, we realized we needed a better network security solution that would defend the university’s network from viruses, worms and unauthorized use, while ensuring that authorized users gained access to all the approved resources and bandwidth,” said Randy Anderson, director of Network Engineering and Technology, at George Mason University. “Now that we have deployed the Vernier ASP, we can ensure that only clean devices can connect to both our wired and wireless networks. Vernier enables us to keep our networks up and running and avoid being taken down by worms and viruses that are most commonly released by student laptops. Its ability to pinpoint and track users allows us to quarantine and deny access to a single troublesome device without having to block off entire dormitories from accessing the campus network and resources.”

In a similar case, the University of Texas at Arlington used the Vernier ASP to preserve Internet and campus network access for their dormitories through the Blaster outbreak that hit campus in the fall of 2003. They have also relied on Vernier’s fine-grain network access control capabilities to manage network access through the SQL Slammer, SoBig and Sasser outbreaks.

“With more than 2,000 students accessing the campus network and the Internet everyday, we face a huge challenge to combat new viruses and worms that can crop up everyday,” said William David Caldwell, director of OIT Network Services at the University of Texas at Arlington. “We selected the Vernier ASP because it is a powerful multi-layered solution that enables us to quickly identify, block and quarantine worms and viruses without having to bring down our network. The Vernier ASP also gives us a flexible infrastructure that scales with our anticipated network expansion and not a monolithic one-box solution.”

The Vernier Adaptive Security Platform provides five layers of network security, designed to provide enterprises with the most rigorous and stringent security controls for their wired and wireless networks. The Vernier network security solution includes: Trusted Network Design, Trusted Network Admission, Trusted Network Defense, Trusted Network Outbreak Management and Trusted Network Remediation. These layers reduce the possibility of an attack, and if an attack occurs, resolve the attack immediately, while adapting policy to prevent future threats to the network. The result is an unprecedented level of network security and an assurance of network continuity.

“Millions of students across the country are utilizing networks secured by Vernier’s ASP,” said Bethany Mayer, vice president of marketing for Vernier. “Instead of using point products to defend their networks, these universities are deploying a coordinated defense against worms and viruses before, during and after attacks occur. Vernier allows university IT managers to gain the comprehensive control they need to enforce campus security policies while delivering state-of-the-art network services students and faculty.”

About Vernier Networks

Vernier Networks offers the industry’s first adaptive network security products for wired and wireless networks that enable enterprises to assure business continuity. Vernier’s Adaptive Security Platform (ASP) proactively protects enterprise networks from increasingly complex attacks, actively resolves intrusions, while continually adapting network security policy to protect against worms, viruses and future threats. Vernier’s proven network security solutions and wireless LAN security solutions operate today in thousands of networks for hundreds of customer worldwide, and have received numerous awards including InfoWorld’s 2004 Technology of the Year Award and the 2003 Product of the Year Award from Network Magazine. Vernier is a privately held company headquartered in Mountain View, Calif. and can be found on the Web at

# # #

Share article on social media or email:

View article via:

Pdf Print

Contact Author

Christine Yum Lenz