Tuesday, January 13, 2009

Considering NAC's expanded uses

NAC can become a key component of an "identity-aware network"
Network World logo

Security: Network Access Control Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by AMD
rule

See the power of the new Quad-Core AMD Optero(TM) processor.
Virtualization is a proven engine that drives business performance. The fusion of the Quad-Core AMD Opteron(TM) processor and virtualization - It's a match made in the data center. Find out more:

rule

Spotlight Story
Considering NAC's expanded uses

Tim Greene By Tim Greene
Those considering NAC and even those who have already bought it might want to consider expanding its use, according to a recent Gartner report. Read full story

Tim Greene is senior editor at Network World.

Related News:

Cisco's ASR 1000 router built for 10-year tenure With enterprises looking to consolidate data centers and devices, Cisco's new ASR 1000 series router offers a compelling message: Do more with less.

How we tested Cisco's ASR We assessed Cisco ASR 1000 performance with tests of unicast and multicast throughput and latency; high availability features, including failover and upgrades; and IPSec tunnel capacity.

Using Server Authentication certificates with the Remote Desktop Gateway Many people seem daunted with the concept of certificates, so Microsoft Subnet blogger Tyson Kopczynski offers a three-part series that dives into how the RD Gateway uses certificates.

Napera expands its NAC capabilities Napera, the company that bases its NAC products on Microsoft software, is expanding the capabilities of its box.

The expanding definition of NAC The Forrester report referenced in the last newsletter says that the expanding definition of NAC will result in more features more widely adopted by NAC vendors next year.

Software agents as management tools for NAC The argument goes you can never control network access for a desktop with a software agent because agents can be hacked, and there is no way to know for certain whether one has been compromised.

Kerio unveils Mac client for its VPN Messaging and security vendor Kerio in March will release a Mac-based VPN client for its WinRoute Firewall.

January giveaways from Cisco Subnet and Microsoft Subnet
Up for grabs: Two Cisco training courses from Skyline-ATS worth up to $6,990, a Microsoft training course from New Horizons worth up to $2,500, 15 copies each of the hot book titles Microsoft SQL Server 2008 Management and Administration, IPv6 Security and Chained Exploits: Advanced Hacking Attacks. Get all the entry details here.


IT Outlook '09
Products of the WeekIn-depth analysis of the latest enterprise strategies, start-ups to watch, people to know, and more.

9 hot technologies for '09
9 hot technologies for '09Our annual rundown, plus a tip or two about how to approach each hot technology.

Sponsored by AMD
rule

See the power of the new Quad-Core AMD Optero(TM) processor.
Virtualization is a proven engine that drives business performance. The fusion of the Quad-Core AMD Opteron(TM) processor and virtualization - It's a match made in the data center. Find out more:

rule

Effectively Managing Change.
Find the right network/system management platforms that leverage the latest IT technologies in this Executive Guide, "The New Network/System Management Challenges." Get a handle on server sprawl, managing 802.11n wireless LANs, and data center automation tool integration. Confidently deploy innovative technologies that drive efficiencies today.
Download this Executive Guide now.


Executive Guide: Green IT
Download this Network World Executive Guide, "Going Green: Trends, tips and case studies," for timely, real-world advice. By adopting an effective green approach to IT you'll save your company money and even bolster company profits.
Find out how to make it happen today.

 

01/13/09

Today's most-read stories:

  1. Why Windows 7 will crush Linux
  2. Web designers admit to trashing client's Web site
  3. Outlook '09
  4. Does Apple have anything to fear from the Palm Pre?
  5. Windows 7 beta: Complete resource center to the OS
  6. Top 25 software screw-ups
  7. Palm Pre vs. Apple iPhone: How they stack up
  8. Security experts ID top 25 programming errors
  9. NSA helps name most dangerous programming mistakes
  10. Joel Snyder's take on SolarWinds' Kiwi buy


The Evolution of Network Security
Zero in on the hottest security technologies you need to know about in this Executive Guide. Better protect your IT environment with NAC, data leakage prevention controls and auditing tools.
Learn more.



IT Buyers guide

 


This email was sent to networking.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: