Security: Network Access ControlThis newsletter is sponsored by AltirisNetwork World's Security: Network Access Control Newsletter, 08/30/07New chips from Intel support Cisco’s flavor of NACBy Tim GreeneNew chips from Intel support Cisco’s NAC. The vPro microprocessors can store certificates for 802.1x authentication, which can be a component of Cisco’s NAC, as well as storing information needed by Cisco’s NAC to determine whether a device complies with security policies. Specifically, Cisco NAC seeks to know things such as whether a device has an updated operating system or updated virus libraries. It uses this information to determine whether the device is safe enough to let onto the network, with a reasonable degree of assurance that the machine is not infected. This checking is generally done either with no specialized software on the end machine - which allows rudimentary endpoint checking - or via software or dissolvable software agents.
The problem with software doing the checks is that the machines are essentially reporting on themselves, a well-known weakness in security architecture. If the end machine is compromised, it might be compromised to the extent that it can lie effectively to the NAC policy engine. The generally accepted better method is to have the endpoint check done in hardware, which is what the new chips support. Cisco NAC posture can be stored in the chips themselves. This makes endpoint checks available even if the hardware is powered down or if the operating system is compromised. The chips also can receive updates for software on the host computers, so the chips could become part of remedying shortcomings that a NAC check reveals. These new features are something that should be kept in mind as businesses update their computers and if they are weighing whether Cisco NAC is the way to go.
|
TODAY'S MOST-READ STORIES: 1. Microsoft blames human error for glitch MOST E-MAILED ARTICLE: |
Contact the author: Tim Greene is a senior editor at Network World, covering network access control, virtual private networking gear, remote access, WAN acceleration and aspects of VoIP technology. You can reach him at tgreene@nww.com. This newsletter is sponsored by AltirisARCHIVEArchive of the Security: Network Access Control Newsletter. BONUS FEATUREIT PRODUCT RESEARCH AT YOUR FINGERTIPS Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details. PRINT SUBSCRIPTIONS AVAILABLE International subscribers, click here. SUBSCRIPTION SERVICESTo subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here. This message was sent to: networking.world@gmail.com. Please use this address when modifying your subscription. Advertising information: Write to Associate Publisher Online Susan Cardoza Network World, Inc., 118 Turnpike Road, Southborough, MA 01772 Copyright Network World, Inc., 2007 |
No comments:
Post a Comment