Thursday, January 03, 2008

University flunks NAC endpoint checks

Security: Network Access Control Alert

Network World logo
NetworkWorld.com | Security Research Center | Update Your Profile
University flunks NAC endpoint checks

Tim Greene By Tim Greene
Use of NAC at Columbia University Medical Center in New York City revealed that slightly more than half the machines using the network flunked endpoint checks. Read full story

Tim Greene is a senior editor at Network World, covering network access control, virtual private networking gear, remote access, WAN acceleration and aspects of VoIP technology. You can reach him at tgreene@nww.com.

MORE STORIESARROW


SPONSORED BY QUALYS
rule

Webcast: Five PCI Best Practices
Listen this to this webcast to learn the latest about the PCI Data Security Standard. Discover why you need to comply with this specification designed to keep owner credit card information private. Learn how to avoid PCI DSS compliance failure and five best practices to supporting the standard. Listen to this webcast now.

rule
RELATED NEWS:

Bad NAC, 12/20/07 Vendors’ failure to rally around a NAC standard rates as one of the worst moves of ’07. See what else made the list.

Swedish municipality enforces NAC policies with Juniper device, 12/20/07 NAC is being used by the municipality of Fredrikstad Kommune to simplify its complex access restrictions to servers that would otherwise require individual policies and access controls. The Swedish municipality set up a Juniper ISG router in the network to enforce NAC policies determined by a Juniper Infranet Controller (IC) device.

Cisco Subnet January giveaways: Win a copy of 'Firewall Fundamentals' book We've got 15 copies of the Cisco Press book Firewall Fundamentals by Wes Noonan and Ido Dubrawsky up for grabs. Check out Wes Noonan's blog for Cisco Subnet.

Top 9 questions you should ask when choosing remote access VPN Here are some questions that you can ask yourself in order to help you choose a remote access VPN protocol or technology ...

The Network World IT Buyer's Guides provide comprehensive, detailed information on how to select, test, buy and deploy thousands of network and IT products. The new Network World IT Buyer's Guides offer even more features than before, here's just one that's worth checking out: Network Access Control


EVERYTHING THAT MATTERS
Everything that Matters in IT Exploring what matters most in IT today.

TAMING THE VIRTUAL BEAST
Clear Choice Test VM management tools from Microsoft, VMware, XenSource leave room for improvement.

SPONSORED BY QUALYS
rule

Webcast: Five PCI Best Practices
Listen this to this webcast to learn the latest about the PCI Data Security Standard. Discover why you need to comply with this specification designed to keep owner credit card information private. Learn how to avoid PCI DSS compliance failure and five best practices to supporting the standard. Listen to this webcast now.

rule

Complimentary Subscriptions for IT Professionals
Sign up today and receive a yearly subscription to Network World magazine. Each week Network World is jam-packed with news, analysis, expert industry opinions and management advice that many network IT professional can't live without. Why not join them? Click here to subscribe: http://www.nww.com/PSA2_0102

Featured reader resource

90% of IT Managers are leaving their company at risk for a DNS ATTACK. Get the tools and resources you need to keep your DNS healthy and secure. Run a DNSreport on your domain today - 56 critical tests run in 8 seconds.

Visit www.dnssfuff.com to learn more. (apply coupon NWW2007NLA for a 25% membership discount)

 

01/03/08

TODAY'S MOST-READ STORIES:

  1. Eight can't-miss tech predictions for 1998
  2. The 15 best downloads of the year
  3. AOL to end support for Netscape browser
  4. 12 IT skills that employers can't say no to
  5. Storm switches tactics third time
  6. Everything that matters in IT
  7. Security dominates 2008 IT agenda
  8. 20 great Firefox extensions
  9. The 25 most innovative products of the year
  10. Management in '08: Can you say automate?

FEATURED BUYER'S GUIDE:
Network Monitoring and Management


Webcast: Beyond perimeter security

Listen to industry experts discuss the need for strong security throughout an IT environment. One expert says, the barbarians are not at the gate, they are already inside. Securing one access point to your network simply is not enough. Learn more today.

Access this webcast now.



IT Buyers guide

IT Buyer's Guides
Compare products, get advice, and check out tests and reviews from the experts at Network World. Over 70 categories. Visit now.

 


To continue receiving NetworkWorld's Security: Network Access Control Alert newsletter, please add @nwfnews.com to your white list.

COMPLIMENTARY SUBSCRIPTIONS AVAILABLE
As a NW newsletter subscriber you are eligible to receive 50 issues of Network World Magazine, in print or electronic format, free of charge.

Sign up for your subscription today: Apply here. International subscribers,click here.

 

SUBSCRIPTION SERVICES
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Terms of Service/Privacy

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772
Copyright Network World, Inc., 2007