Tuesday, November 27, 2007

When it's OK to use NAC endpoint checking sporadically

Security: Network Access Control Alert Network World logo
NetworkWorld.com | Security Research Center | Update Your Profile
When it's OK to use NAC endpoint checking sporadically

Tim Greene By Tim Greene
A recurring theme among NAC customers is they use NAC endpoint checking sporadically. When a computer has been scanned and found compliant once, it is designated good to connect to the network for an extended period of time - a month is the timeframe that keeps coming up. Read full story

Tim Greene is a senior editor at Network World, covering network access control, virtual private networking gear, remote access, WAN acceleration and aspects of VoIP technology. You can reach him at tgreene@nww.com.


SPONSORED BY AWARENESS TECHNOLOGIES INC.
rule

Discover the Benefits of Desktop Agents
Learn how you can better protect your network from off-net, insider threats with desktop agents. Find out how this security technology allows IT managers to monitor and archive all communication and keystrokes on end-user laptops. Discover more benefits today. Download this whitepaper now!

rule
RELATED NEWS:

Apple 'fixes' causing problems, 11/26/07: Apple might be suffering from a little post-Thanksgiving indigestion as a new bug in QuickTime is cauing problems for Windows XP and Vista users. And an older ...

NetPro tools support Active Directory backup and restore, extends audit collection - ..., 11/26/07: Last week, I promised to tell you about the new offerings from NetPro, and all of them (there are three) are worth paying attention to. ...

Find your Web app vulnerabilities..please, 11/26/07: The busy holiday shopping season is upon us. Every day, millions of people log in to Web applications to make purchases. As long as they see the " ...

How to Join - NetworkWorld.com Buyer's Guides, 11/25/07: Network World Buyer's Guides are a one-stop shop for the most detailed and accurate information on products offered in the topics below. We've built the industry's most in-depth searchable database, comprising thousands of details on hundreds of ...

NetworkWorld.com Buyer's Guides, 11/25/07: Network World Buyer's Guides provide you with the most detailed and accurate information on thousands of network and IT products from anti-spam to application acceleration to storage management wares. Make informed buying decisions for your enterprise ...

UK kids warned MySpace isn't private - OMG!!, 11/23/07: Young people are compromising their career prospects and opening the door to online fraud by posting personal information on social networking sites without thinking about the consequences, a U.K. privacy watchdog warned Friday.


BIG THREATS IN '08
Top 5 security threats in 2008Top 5 security-menace predictions for next year.

ALL-IN-ONE FIREWALL TEST
idemandJuniper, Check Point, Cisco lead way in test of 13 UTM devices.

SPONSORED BY AWARENESS TECHNOLOGIES INC.
rule

Discover the Benefits of Desktop Agents
Learn how you can better protect your network from off-net, insider threats with desktop agents. Find out how this security technology allows IT managers to monitor and archive all communication and keystrokes on end-user laptops. Discover more benefits today. Download this whitepaper now!

rule

Join Network World's Technology Opinion Panel
Here is your chance to help shape the future of IT. You know what products and enhancements are needed, you have the insight and foresight to be out front and provide direction to Network Word and the network industry. To join the panel, complete a brief registration survey
. The panel is strictly for technology professionals to share their vision.

Featured reader resource

90% of IT Managers are leaving their company at risk for a DNS ATTACK. Get the tools and resources you need to keep your DNS healthy and secure. Run a DNSreport on your domain today - 56 critical tests run in 8 seconds.

Visit www.dnsreport.com to learn more. (apply coupon NWW2007NLA for a 25% membership discount)

 

11/27/07

TODAY'S MOST-READ STORIES:

  1. BSA, software giants target little guys
  2. 2007 Cool Yule Tools Gift Guide
  3. Teleworkers called back to cubicle life
  4. '07 Enterprise all-stars
  5. Testing all-in-one firewalls
  6. Security concerns cloud virtualization
  7. Hackers jack Monster.com
  8. Google building 10G Ethernet switches
  9. Cutting-edge spam research projects
  10. Verizon tests 100Gbps network

MOST-READ TEST:
Testing all-in-one firewalls


Executive Guide The Security Treadmill

This Executive Guide offers interviews with leading, real-world security experts who tell you how to get inside users' heads, fight for a bigger security budget, and whether VoIP security issues are overstated or underrated, and much more. Review this informative guide today.

Click Here for More Information



IT Buyers guide

IT Buyer's Guides
Compare products, get advice, and check out tests and reviews from the experts at Network World. Over 70 categories. Visit now.

 


To continue receiving NetworkWorld's Security: Network Access Control Alert newsletter, please add @nwfnews.com to your white list.

COMPLIMENTARY SUBSCRIPTIONS AVAILABLE
As a NW newsletter subscriber you are eligible to receive 50 issues of Network World Magazine, in print or electronic format, free of charge.

Sign up for your subscription today: Apply here. International subscribers,click here.

 

SUBSCRIPTION SERVICES
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Terms of Service/Privacy

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772
Copyright Network World, Inc., 2007

 

 



1 comment:

Justin Lofton said...

Find out about the 5 Steps to Successful IT Consolidation.

Also, find out what WAN acceleration solution is right for you....

Cisco WAAS vs Riverbed Steelhead