Security: Network Access ControlNetwork World's Security: Network Access Control Newsletter, 10/04/07ForeScout software scans network endpoints inside and outBy Tim GreeneForeScout, which previously scanned network endpoints externally, is introducing client software that checks out machines as they try to join networks. Secure Connector is a dissolvable agent that is downloaded to client machines and runs during a given session then dissolves. The agent can also be permanently installed on the client machines if, for example, they are managed by the customer. Secure Connector interrogates the machines for security posture data that it forwards to the ForeScout CounterACT NAC platform to make a policy decision about whether to admit the machines to the network. The client, which is a .exe file, connects to the CounterACT platform via an SSL connection, making it possible for the agent on remote machines to link in through a corporate firewall.
If the end machines will not accept the agent, CounterACT performs a clientless interrogation that yields less information about the state of the machines. An upgraded software version for CounterACT enables a new option for enforcing policies. Session-specific enforcement can enforce separate policies depending on what time of day a user is accessing the network, or what domain the machine is attached to, for instance. The software can detect ARP spoofing that may indicate a man-in-the-middle attack and block it. The software can also perform open-port hardening that diverts traffic from non-used ports to a quarantined virtual LAN. CounterACT software supports VoIP phones that are connected to PCs on corporate networks. If the PCs are found out of compliance with NAC policy, they can be restricted but the phones are still allowed to work. The new software is available now.
|
MOST-READ REVIEWS FOR THE PAST YEAR: 1. NAC alternatives hit the mark |
Contact the author: Tim Greene is a senior editor at Network World, covering network access control, virtual private networking gear, remote access, WAN acceleration and aspects of VoIP technology. You can reach him at tgreene@nww.com. ARCHIVEArchive of the Security: Network Access Control Newsletter. BONUS FEATUREIT PRODUCT RESEARCH AT YOUR FINGERTIPS Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details. PRINT SUBSCRIPTIONS AVAILABLE International subscribers, click here. SUBSCRIPTION SERVICESTo subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here. This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription. Advertising information: Write to Associate Publisher Online Susan Cardoza Network World, Inc., 118 Turnpike Road, Southborough, MA 01772 Copyright Network World, Inc., 2007 |
1 comment:
curry 4
yeezy boost
yeezy boost 350 v2
curry 4
moncler
supreme hoodie
off white nike
balenciaga trainers
yeezys
balenciaga
Post a Comment