Tuesday, February 17, 2009

Choosing a NAC vendor

NAC customer chooses to go with the little guy, the NAC-only vendor
Network World logo

Security: Network Access Control Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Qualys
rule

Preparing for the Next Cyber Attack.
Ensure you are up-to-speed on the latest security technologies available to keep your network safe in this Executive Guide. Get a thorough assessment of the corporate security threat landscape. Protect your network with data leakage protection, NAC and other technologies explained in this report. Download this Executive Guide now.

rule

Spotlight Story
Choosing a NAC vendor

Tim Greene By Tim Greene
A recent conversation with a NAC customer revealed a traditional type of reasoning that is sound enough and probably more common than you might think: nobody ever got fired for going with IBM (or Microsoft or Cisco or fill in the blank). But this has a twist. Read full story

Tim Greene is senior editor at Network World.

Related News:

Must-dos for evaluating NAC gear Anyone deploying NAC needs to test the products they are considering, and here are a few must-do tests for comparison.

Considering NAC's expanded uses Those considering NAC and even those who have already bought it might want to consider expanding its use, according to a recent Gartner report.

ConSentry adds network audit and control software Network access control specialist ConSentry is moving away from pure NAC, and towards providing wider visibility and control over the network. It has developed software that uses the deep packet inspection chips built into its switches and controllers to track and audit all sorts of network activity.

ConSentry upgrades its threat engine ConSentry’s new software for its intelligent switches adds a permanent agent for assessing endpoint security and can assess what Windows operating system patches have been applied.

ConSentry's LANShield gear has NAC ConSentry makes switches that support NAC, and that is how the company hyped itself when it started out, but the gear does a lot more.

ConSentry lands more funding Even in these hard economic times ConSentry Networks has managed to land another round of funding - this one for $9.4 million.

ConSentry CEO talks up security issues Network-access-control start-up ConSentry Networks has filled its long-vacant CEO position with Joe Golden, a partner in Accel Partners, a ConSentry investor. Golden was a partner in Accel Partners' London venture-capital office from 2001 until ConSentry hired him; before that he was Cisco's managing director of business development and strategic alliances for Europe, Middle East and Africa. With NAC in flux and with some start-ups having failed, Golden spoke with Network World Senior Editor Tim Greene about ConSentry, its strategy and the future of NAC.

February giveaways from Cisco Subnet and Microsoft Subnet
Up for grabs: One American Express gift card worth $250 from Global Knowledge; One Microsoft training course worth $2,995 from Global Knowledge; 15 copies each of the hot book titles Voice over IP Security, and CCNA Wireless Official Exam Certification Guide and 15 copies of Exchange Server 2007 How-To: Real Solutions for Exchange Server 2007 SP1 Administrators. Get all the entry details here.


IT & social networks
where IT pros do their social networkingSurvey takes a look at where IT pros do their social networking.

Hot spot safety tips
Top 10 hot spot safety tipsHow to protect laptop data at your local Wi-Fi hot spot.

Sponsored by Qualys
rule

Preparing for the Next Cyber Attack.
Ensure you are up-to-speed on the latest security technologies available to keep your network safe in this Executive Guide. Get a thorough assessment of the corporate security threat landscape. Protect your network with data leakage protection, NAC and other technologies explained in this report. Download this Executive Guide now.

rule

Avoid the SMB Technology Quagmire
SMBs have concrete technology needs, but it's difficult to find cost-effective, easy to manage and secure solutions. Get real-world advice on how to complete this task in this Special Briefing, "Avoiding Techno-quicksand for Small and Medium Businesses." Find out how to select the right products for your organization today.
Download this Special Briefing now.


Everybody says "Do more with less!"
But no one tells you how. We will and it costs nothing to find out at IT Roadmap Conference and Expo. Coming to 10 cities in 09 including New York in February, Denver in March, Chicago in April.
Register now, attend free

 

02/17/09

Today's most-read stories:

  1. Microsoft announces $250,000 Conflicker worm bounty
  2. Evolution of PCs, Macs, Internet, routing, cell phones, Microsoft Windows
  3. Palm pulls the plug on Palm OS, bets the future on Pre's webOS
  4. Largest coordinated ATM rip-off ever nets $9+ million
  5. Iridium calls may suffer outages from satellite crash
  6. Microsoft renames, expands free online services for higher-ed
  7. New amplifier paves way for 10Gbps wireless Web
  8. NSA identifies top 25 programming errors
  9. Rumor mill: Cisco to buy VMware?
  10. Did Borat help Cisco?


Preparing for the Next Cyber Attack.
Ensure you are up-to-speed on the latest security technologies available to keep your network safe. Get a thorough assessment of the corporate security threat landscape. Protect your network with data leakage protection, NAC and other technologies.
Download this Executive Guide now.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment