SOURCE: Identity Engines, Inc.

April 17, 2007 11:00 ET

Identity Engines and Southern University Crack the Code on 802.1X, Free Webinar Hosted by Campus Technology

SUNNYVALE, CA -- (MARKET WIRE) -- April 17, 2007 --

What:  On April 19th, Identity Engines, a leading provider of
       identity-based network access solutions, and Campus Technology
       Magazine are presenting an insightful discussion on successful
       strategies for deploying 802.1X, featuring real-world examples
       from Southern University. Registration for this free webinar is
       recommended at

       With graduation just around the corner, universities again face
       the annual challenge of adding new students to the network in the
       fall. Attend this free panel discussion with Srinivas Yadavalli,
       Network Administrator and Tramelle Williams, IT Specialist of
       Southern University Law Center, as well as 802.1X experts from
       Identity Engines, as they share the secrets for ensuring a rapid
       and successful deployment of 802.1X, specifically exploring the
       complex challenge of establishing network access for new students.

       Hosted by Campus Technology's Doug Gale, the panel of experts will
       discuss new approaches for:

       -- Eliminating repetitive and frequent calls to the IT helpdesk
       -- Reducing user frustration with automatic configuration of network
       -- Maximizing IT resources through secure, delegated guest access

       Driven by ever-growing user demand for ubiquitous network access,
       many of today's colleges and universities are adopting 802.1X as the
       authentication and access control framework to secure wired and
       wireless networks.

When:  Thursday: April 19, 2007, 2:00 p.m. ET/11:00 a.m. PT
About Identity Engines, Inc.

Identity Engines develops scalable, identity-based solutions for securing enterprise networks. The company's solutions provide comprehensive identity services such as authentication, authorization, and auditing to distributed network devices while enabling centralized administration and policy management for improved access control and compliance. For more information, visit

Contact Information