Search This Blog

Thursday, February 12, 2009

StillSecure on the fence about hosted NAC

StillSecure is looking to get into the security services business but still on the fence about including hosted NAC
Network World logo

Security: Network Access Control Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Juniper Networks
rule

Expert advice on improving a data center
Discover how to significantly simplify your data center architecture while containing costs and improving efficiency and reliability. On March 12, data center design and implementation experts will share in-depth advice on new approaches and examples of deployments - including price, performance and savings. Register for this Live Webcast now.

rule

Spotlight Story
StillSecure on the fence about hosted NAC

Tim Greene By Tim Greene
When StillSecure announced this week it will offer services as well as security gear, it was still on the fence about whether to include hosted NAC. Read full story

Tim Greene is senior editor at Network World.

Related News:

Security services in mind, StillSecure buys ProtectPoint StillSecure is looking to get into the security services business with the acquisition of ProtectPoint today.

Novell enters NAC market via partnership Novell is getting into network access control via an OEM agreement with StillSecure that initially provides a stand-alone product but also includes plans to ensure that software works well with Novell’s ZENworks configuration management.

StillSecure provides flexible NAC with SafeAccess StillSecure Safe Access is an appliance that can be deployed in three scenarios – as part of an 802.1X authentication scheme, sitting in-line or working in conjunction with DHCP server. In the last scenario, which is sometimes the only option for an organization based on infrastructure limitations, is when SafeAccess performs an endpoint assessment before the DHCP server gives the endpoint an IP address and provides network access. The drawback with DHCP is that a static IP addresses can bypass the endpoint-assessment process.

A networking reality: Customers like boxes StillSecure has decided to face a networking reality: customers like boxes. While it may be less expensive to buy software and install it on off-the-shelf servers, for some reason, customers seem to prefer buying a hardware/software combo that they can plug in and have support for.

NAC questions nag at big security vendors Symantec and McAfee appear to be bumping up against a common wall when it comes to one component typically found in security software suites: Network access control.

Windows 7 gets IPsec VPN client Windows 7 is still in beta, but that hasn't stopped German security developer NCP Engineering releasing what it claimed is the first universal IPsec VPN client for it. It is making the software available as a free beta ...

Alcatel-Lucent broadens Carrier Ethernet lineup Alcatel-Lucent unveiled enhancements to its Carrier Ethernet lineup that include a customer premises switch for business VPNs.

February giveaways from Cisco Subnet and Microsoft Subnet
Up for grabs: One American Express gift card worth $250 from Global Knowledge; One Microsoft training course worth $2,995 from Global Knowledge; 15 copies each of the hot book titles Voice over IP Security, and CCNA Wireless Official Exam Certification Guide and 15 copies of Exchange Server 2007 How-To: Real Solutions for Exchange Server 2007 SP1 Administrators. Get all the entry details here.


IT & social networks
where IT pros do their social networkingSurvey takes a look at where IT pros do their social networking.

Hot spot safety tips
Top 10 hot spot safety tipsHow to protect laptop data at your local Wi-Fi hot spot.

Sponsored by Juniper Networks
rule

Expert advice on improving a data center
Discover how to significantly simplify your data center architecture while containing costs and improving efficiency and reliability. On March 12, data center design and implementation experts will share in-depth advice on new approaches and examples of deployments - including price, performance and savings. Register for this Live Webcast now.

rule

Preparing for the Next Cyber Attack.
Ensure you are up-to-speed on the latest security technologies available to keep your network safe. Get a thorough assessment of the corporate security threat landscape. Protect your network with data leakage protection, NAC and other technologies.
Download this Executive Guide now.


Preparing for IPv6.
Get concrete facts on what IPv6 adoption means for your organization in this Executive Guide. Learn how IPv6 and IPv4 can coexist and the role of NAT devices in this new world. Find out if you need to develop a business case today and how to get started.
Download this Executive Guide now.

 

02/12/09

Today's most-read stories:

  1. Largest coordinated ATM rip-off ever nets $9+ million
  2. Shareholders say Microsoft squanders billions on R&D projects
  3. Evolution of PCs, Macs, Internet, routing, cell phones, Microsoft Windows
  4. Google's Latitude: Not new, but worrisome
  5. FAA network hacked
  6. A few clean words from the creator of Cursebird
  7. Nortel to shed shareholders meeting, more employees
  8. Kaspersky says Web hack 'should not have happened'
  9. Google adds ActiveSync to accommodate iPhone, Win Mobile
  10. IBM, Juniper join in cloud strategy


Product Guides
Get side-by-side product comparisons, buying tips, market trend information, case studies and more with Network World's Patch Management Product Guide.
Visit now



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: