Search This Blog

Tuesday, February 10, 2009

The IETF extends its timeframe for NAC standards

The IETF extends its timeframe to further improve the proposal for NAC standards
Network World logo

Security: Network Access Control Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by HP
rule

HP Global network audit and control
Get the facts on the HP Network Automation architecture that intelligently uses network bandwidth and adheres to company security policies and best practices without creating security violations or affecting your production environment. Learn more today.

rule

Spotlight Story
The IETF extends its timeframe for NAC standards

Tim Greene By Tim Greene
The last newsletter cited in error some milestones for completion of Internet Engineering Task Force NAC standards as if they were the actual timetable. Read full story

Tim Greene is senior editor at Network World.

Related News:

IETF standards for NAC in the final stages Internet Engineering Task Force standards for NAC are in their final stages, according to IETF postings.

NAC questions nag at big security vendors Symantec and McAfee appear to be bumping up against a common wall when it comes to one component typically found in security software suites: Network access control.

Is your NAC compatible with your switches? Independent NAC vendors make NAC gear that employs network access switches as enforcement points, but before buying, customers should make sure the switches and the particular NAC product are compatible.

Main NAC use: Guest enforcer NAC is used mainly to keep guests and contractors under control when they connect to corporate networks, according to a new Gartner study.

What's the Conficker worm got to do with NAC? The Conficker worm doesn't directly have anything to do with NAC, but as is the case when any pervasive attack becomes high profile, vendors leap in to point out how their products could have prevented the problem.

Must-dos for evaluating NAC gear Anyone deploying NAC needs to test the products they are considering, and here are a few must-do tests for comparison.

February giveaways from Cisco Subnet and Microsoft Subnet
Up for grabs: One American Express gift card worth $250 from Global Knowledge; One Microsoft training course worth $2,995 from Global Knowledge; 15 copies each of the hot book titles Voice over IP Security, and CCNA Wireless Official Exam Certification Guide and 15 copies of Exchange Server 2007 How-To: Real Solutions for Exchange Server 2007 SP1 Administrators. Get all the entry details here.


IT & social networks
where IT pros do their social networkingSurvey takes a look at where IT pros do their social networking.

Hot spot safety tips
Top 10 hot spot safety tipsHow to protect laptop data at your local Wi-Fi hot spot.

Sponsored by HP
rule

HP Global network audit and control
Get the facts on the HP Network Automation architecture that intelligently uses network bandwidth and adheres to company security policies and best practices without creating security violations or affecting your production environment. Learn more today.

rule

Effectively Managing Change.
Find the right network/system management platforms that leverage the latest IT technologies in this Executive Guide, "The New Network/System Management Challenges." Get a handle on server sprawl, managing 802.11n wireless LANs, and data center automation tool integration. Confidently deploy innovative technologies that drive efficiencies today.
Download this Executive Guide now.


Preparing for IPv6.
Get concrete facts on what IPv6 adoption means for your organization in this Executive Guide. Learn how IPv6 and IPv4 can coexist and the role of NAT devices in this new world. Find out if you need to develop a business case today and how to get started.
Download this Executive Guide now.

 

02/10/09

Today's most-read stories:

  1. Wikileaks releases 6,780 Congressional reports
  2. Mac clone maker wins legal round against Apple
  3. Microsoft rounds out voice assault
  4. Security problems still plague retailers' wireless LANs
  5. Mommas don't let their babies grow up to be engineers
  6. Porn site feud spawns new DNS attack
  7. Top 10 spam-friendly registrars named and shamed
  8. Cisco is not ruling out layoffs
  9. Nortel still signing up customers
  10. Apple planning TV with iTunes integration and DVR capability?


Preparing for the Next Cyber Attack.
Ensure you are up-to-speed on the latest security technologies available to keep your network safe. Get a thorough assessment of the corporate security threat landscape. Protect your network with data leakage protection, NAC and other technologies.
Download this Executive Guide now.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: