Tuesday, March 31, 2009

Defining NAC roles is key

NAC roles need to be defined to meet corporate business goals and security policies
Network World logo

Security: Network Access Control Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Fluke Networks
rule

Accurately Troubleshoot your Apps
Are your application troubleshooting processes in need of a facelift? Download this whitepaper to learn how to accurately pinpoint application problems and quickly resolve them. The five keys to effective troubleshooting are clearly explained in this in-depth report. Learn more today. Read this whitepaper now.

rule

Spotlight Story
Defining NAC roles is key

Tim Greene By Tim Greene
Setting roles is a key part of any NAC deployment to help simplify configuration and management. Read full story

Tim Greene is senior editor at Network World.

Related News:

Editor's note: Starting April 6 the Security: Network Access Control Alert will become the Cloud Security Alert to address this growing technology and it's impact on security. We hope you will enjoy this new and improved version. We thank you for reading Network World newsletters. If you wish to update your newsletter subscriptions, please click here.

A hidden chore of deploying NAC One of the great hidden chores of deploying NAC is finding all the devices that are attached to the network, even those that can't authenticate.

NAC remediation options When NAC was conceived, it had everything to do with finding out if endpoints met security checks, but not so much about what to do about it.

NAC as a compliance tool NAC is mainly pushed as a risk-mitigation technology that can reduce the likelihood that an endpoint is infected or carrying out unauthorized activity, but its features have been pressed into other duties.

Business size and NAC needs As NAC matures, it is becoming clear that the needs of smaller businesses and those of enterprises call for different solutions.

NAC-as-a-service The recent purchase of Mirage Networks by service provider Trustwave raises questions about whether NAC-as-a-service is a viable business.

Prevent intrusions: What to look for In the Buying Tips section of our Product Guide, find 15 questions to ask about IPS before you buy one.

Enter for a Microsoft training giveaway from New Horizons
New Horizons Computer Training is offering a free Microsoft training course worth up to $2,500 to be given to one lucky Microsoft Subnet reader. Deadline for entry is March 31.

Network World on Twitter Get our tweets and stay plugged in to networking news.


App to no good
10 iPhone apps that could get you into troubleA look at the top 10 iPhone apps that could get you into trouble.

CEO payday breakdown
CEO payday: How much tech chiefs made in '08A detailed account of how much tech chiefs made in 2008.

Sponsored by Fluke Networks
rule

Accurately Troubleshoot your Apps
Are your application troubleshooting processes in need of a facelift? Download this whitepaper to learn how to accurately pinpoint application problems and quickly resolve them. The five keys to effective troubleshooting are clearly explained in this in-depth report. Learn more today. Read this whitepaper now.

rule

Complimentary DNS newsletter
Sign-up today and receive the latest DNS news and analysis. This newsletter provides deep insight into this murky area and offers ways to understand and mitigate risk with better management and control of your domain, email and DNS.
Sign up now at


Network World's IT Resource Library
Whether you're looking to gear up on one specific topic or you're trying to stay current on several areas, Network World's resource library has what you're looking for. Our comprehensive collection of resources will make your job easier.
Visit Now

 

03/31/09

Today's most-read stories:

  1. Deep computer-spying network touched 103 countries
  2. Preparing for the Pre: Palm and Sprint must get it right
  3. Seven reasons MPLS has been wildly successful
  4. April Fool's Conficker threat is likely hype
  5. Google: IPv6 is easy, not expensive
  6. CEO payday: How much tech chiefs made in '08
  7. Top 10 technology skills
  8. Nine cool geek tips I just can't function without
  9. IETF to explore new routing technique
  10. IBM layoffs incite backlash
  11. Students learn through robot battles


Network World on Twitter: Get our tweets and stay plugged in to networking news


The Need for an Adaptive Threat Management Architecture - Live March 31.
Create a more secure and efficient network. Find out how in this Live Webcast, "The Need for an Adaptive Threat Management Architecture." Join us on Tuesday, March 31, 2009, at 1:00 p.m. ET/10:00 a.m. PT. Get real-world advice from Jon Oltsik, senior analyst at consulting firm Enterprise Strategy Group.
Register today for this Live Webcast.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment