Bradford Networks Premieres Network Sentry 8.2

Share Article

Newest Release Enhances Compensating Controls for IoT Network Device Security and Offers Deeper Partner Integration

Bradford Networks, an innovator in transforming network security through visibility, control and response, released today version 8.2 of its award-winning security automation and orchestration solution, Network Sentry.  This newest release of Bradford Networks’ leading network security solution now includes new Internet of Things (IoT) simulation and identification capabilities, enhancing customers' ability to discover, profile and validate all headless and Internet of Things (IoT) devices on their networks, then automatically apply relevant rules. Combined with this latest version’s new on-connect endpoint revalidation capabilities, Bradford Networks provides several new tools to customers' arsenals to quickly detect unknown or rogue devices on their network.

Network Sentry 8.2 also integrates with more vulnerability scanners and provides more comprehensive network mapping to improve customers' security posture and provide better outcomes for security audits and penetration tests. New capabilities include new Qualys vulnerability scanner integrations, so customers can configure and manage scans within Network Sentry directly, as well as deploy rules for host containment as needed. Network Sentry 8.2 also includes new network topology mapping capabilities so customers can more easily customize and map their entire network, ensuring no device slips through the cracks.

“IoT devices are one of the biggest security threats facing the enterprise network,” says Frank Andrus, CTO and founder of Bradford Networks. “Network Sentry 8.2 offers enhanced compensating controls for IoT devices to enable more granular control. In addition, this new release simplifies penetration testing and network mapping, as well as provides deeper partner integration to simplify and strengthen our customers’ security.”

In addition to existing product integrations, the following are also now supported:

  • Full Qualys vulnerability scanner integration: request and process scan results entirely within Network Sentry
  • Bidirectional FortiSIEM integration: fully leverage Network Sentry’s context-aware event and containment options during incident investigation or remediation
  • FortiSwitch support: when connected to a FortiGate Firewall, Network Sentry customers get full user/device visibility and control over all connected endpoints connected to FortiSwitch
  • Palo Alto Networks VPN support: Network Sentry customers get full user/device visibility and control over all VPN connections on Palo Alto Networks VPN controllers

Based on patented technologies, Bradford Networks’ Network Sentry is an award-winning security automation and orchestration solution, designed to meet the demands of organizations of all sizes. Recognized as a leader in an open approach via technology partnerships to deliver integrated best-in-class technologies, the platform serves as a core component of a comprehensive security posture.  Network Sentry provides full visibility into desktop, mobile and IoT endpoints on the network, offers dynamic network access control to support the mobile workforce, and automates threat response to reduce containment time.

About Bradford Networks

Bradford Networks is leading the transformation of network security by providing visibility, control and response to minimize the risk and impact of cyber threats.  The company’s patented Network Sentry solution continuously assesses the risk of every user and endpoint, and automatically contains compromised devices that act as backdoors for cyber criminals. The company’s award-winning Network Sentry is used by more than 1000 enterprise companies worldwide across many market sectors, including finance, government and defense, healthcare, education, logistics and transportation, media and entertainment, retail and hospitality, technology, utilities and many others. For more information, please visit

Share article on social media or email:

View article via:

Pdf Print

Contact Author

Michelle Coulombe
Visit website