Security: Network Access ControlThis newsletter is sponsored by ProCurve Networking by HPNetwork World's Security: Network Access Control Newsletter, 10/16/07It takes more than NAC to block malwareBy Tim GreeneOf businesses that already use NAC in combination with antivirus software, more than a third suffer malware attacks anyway, according to a survey funded by Symantec. Based on results of questioning 300 people who attended InfoSecurity 2007, 82% said they use NAC in combination with antivirus software, and 36% said their networks became infected with malware anyway. This result indicates what is commonly accepted about NAC, that it isn’t the only security networks need to block malware. It is a risk-mitigation measure because it can identify machines less likely to be infected and allow only those onto the network. But as the result shows, that doesn’t mean they aren’t infected.
Those who had implemented NAC were asked the main reasons for doing so, and were allowed to respond to more than one choice. The top three chosen were preventing unauthorized users from getting on the network (80%); preventing data loss (66%); and enforcing security and access policies (61%). More than half (55%) of the respondents already have NAC of some sort installed in their networks, and 31% say they are not interested in NAC. These NAC users were also asked what other technologies they required to interoperate with NAC, and 98% chose other security software. Three other technologies mentioned were virtual desktops (53%); printers and peripherals (51%); and mobile gear (47%). The top three reasons businesses hadn’t deployed NAC were that it cost too much (35%); it was incompatible with the network or operating systems (27%); and it was too disruptive to the network and to the organization as a whole (20%). Asked where they thought NAC was best enforced, 63% said on the network; and 37% said on the endpoint. Each choice included a qualifying statement. Part of the network question said, “It’s better to rely on the network’s own security features to prevent attacks and damage.” The endpoint choice included, “It’s better to evaluate and remediate devices before they connect to the network.” When asked “what frustrations, if any, have you had in implementing or managing” NAC, an astounding 86% said “none.” Based on reports about product testing done by professionals and on anecdotes from NAC customers, it’s hard to believe so many found no frustrations.
|
| Contact the author: Tim Greene is a senior editor at Network World, covering network access control, virtual private networking gear, remote access, WAN acceleration and aspects of VoIP technology. You can reach him at tgreene@nww.com. This newsletter is sponsored by ProCurve Networking by HPARCHIVEArchive of the Security: Network Access Control Newsletter. BONUS FEATUREIT PRODUCT RESEARCH AT YOUR FINGERTIPS Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details. PRINT SUBSCRIPTIONS AVAILABLE International subscribers, click here. SUBSCRIPTION SERVICESTo subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here. This message was sent to: networking.world@gmail.com. Please use this address when modifying your subscription. Advertising information: Write to Associate Publisher Online Susan Cardoza Network World, Inc., 118 Turnpike Road, Southborough, MA 01772 Copyright Network World, Inc., 2007 |
1 comment:
In my opinion, Riverbed has the best of breed solution for application accelerator. I work as an engineer, for a Cisco partner and we are also partnered with Riverbed, because they have the best WAN Accelerator technology out there at this point. I have a lot of comparison data on all the competitors if anyone is interested. Forrester, Gartner, etc...
Justin Lofton
Systems Engineer
justinl@tredent.com
Tredent Data Systems, Inc.
WAN Acceleration Information
Post a Comment