Search This Blog

Tuesday, June 05, 2007

Keeping guests corralled

Network World

Network Access Control




Network World's Network Access Control Newsletter, 06/05/07

Keeping guests corralled

By Tim Greene

In practice, the most common reason for using NAC has been to keep guest visitors corralled when they log in to corporate networks.

These visitors range from people who have appointments onsite and who want to check their e-mails via laptop to consultants who are hired to perform vital business functions.

The main thing these two groups have in common is they both use unmanaged machines, at least unmanaged by the host network. There is no trust between them and the network security staff, so access is restricted, often to nothing more than Internet access.

The Security Standard - The Only Executive Summit Focused on the Business, Management and Strategic Aspects of Security

September 10-11, 2007 | The Fairmont Hotel Chicago
How do your security initiatives support company business goals? The answer to this question can make all the difference in gaining the corporate-wide support and resources you need to drive your security strategies. Uncover best practices and organizational strategies for achieving success by attending The Security Standard Conference. Click here for more details. Click here for more details

The unmanaged-machine problem is also why NAC is popular on college campuses. Students represent the largest single group of users on most campuses and virtually none of them owns a machine managed by the college IT staff.

NAC frees up short-staffed colleges at the start of semesters by automating basic scans of these computers for operating system patches and updated virus signatures and that seems enough for many schools. The alternative is a manual check of each student machine, a process that some colleges say took weeks at the start of each semester.

According to NAC experts at the recent Interop Las Vegas show, though, a growing number of NAC users are looking to meet regulations imposed on them by the government or industry groups. They need to restrict access to key data and to prove that they did so

In this case, businesses must prove that only legitimate users of data access it and that when they do they do so in accordance with set regulatory policies.

NAC can help fill at least part of the bill by restricting authorization to key assets. But the biggest hurdle NAC vendors have to clear right now is making their gear work within existing networks without forcing major network upgrades, the experts say.

Over time, as businesses upgrade their network infrastructure on their standard replacement schedules they will be more likely to buy NAC-compatible gear, which will help lift the problem. In the meantime, experts say, vendors need to work on compatibility with each other’s NAC equipment so when that day comes, customers will have choices.


  What do you think?
Post a comment on this newsletter

TODAY'S MOST-READ STORIES:

1. What Google bought in the past 12 months
2. Avaya buyout rumors reveal VoIP market churn
3. Did Street View spook Eric Schmidt?
4. Malware hidden in fake IRS notices
5. Adult filmmakers taking their lumps on ‘Net?
6. Is Apple enterprise-ready?
7. Google Desktop vulnerable to new attack
8. EMC buys authentication service provider Verid
9. Will Cisco suffer IBM's fate?
10. Michigan man fined for using free Wi-Fi

MOST E-MAILED STORY:
Michigan man fined for using free Wi-Fi


Contact the author:

Tim Greene is a senior editor at Network World, covering network access control, virtual private networking gear, remote access, WAN acceleration and aspects of VoIP technology. You can reach him at tgreene@nww.com.



ARCHIVE

Archive of the Network Access Control Newsletter.


BONUS FEATURE

IT PRODUCT RESEARCH AT YOUR FINGERTIPS

Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details.


PRINT SUBSCRIPTIONS AVAILABLE
You've got the technology snapshot of your choice delivered to your inbox each day. Extend your knowledge with a print subscription to the Network World newsweekly, Apply here today.

International subscribers, click here.


SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription.


Advertising information: Write to Associate Publisher Online Susan Cardoza

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772

Copyright Network World, Inc., 2007

No comments: