Thursday, January 22, 2009

Eliminating P2P headaches with NAC

Colleges are proving one of the strongest markets for NAC
Network World logo

Security: Network Access Control Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Oracle
rule

Successfully Manage a Secure Database.
Database professionals are invited to join this Oracle Live Webcast on Thursday, February 5 at 2:00 p.m. ET/11:00 a.m. PT. Gain a better understanding of database security and how to more strategically work with security administrators. Don't miss out. Register for this live webcast now

rule

Spotlight Story
Eliminating P2P headaches with NAC

Tim Greene By Tim Greene
Peer-to-peer music sharing is one of the biggest friends to NAC as a business. Read full story

Tim Greene is senior editor at Network World.

Related News:

Fayetteville State University troubleshoots with NAC Since it has implemented ConSentry NAC gear, Fayetteville State University in North Carolina finds that it gives the school better visibility into network traffic that results in using the gear as a troubleshooting tool.

Considering NAC's expanded uses Those considering NAC and even those who have already bought it might want to consider expanding its use, according to a recent Gartner report.

Software agents as management tools for NAC The argument goes you can never control network access for a desktop with a software agent because agents can be hacked, and there is no way to know for certain whether one has been compromised.

Must-dos for evaluating NAC gear Anyone deploying NAC needs to test the products they are considering, and here are a few must-do tests for comparison.

Who goes there? Identity management is all about who you are and what you should be allowed to do. This Product Guide describes the technology and how it works.

January giveaways from Cisco Subnet and Microsoft Subnet
Up for grabs: Two Cisco training courses from Skyline-ATS worth up to $6,990, a Microsoft training course from New Horizons worth up to $2,500, 15 copies each of the hot book titles Microsoft SQL Server 2008 Management and Administration, IPv6 Security and Chained Exploits: Advanced Hacking Attacks. Get all the entry details here.


IT Outlook '09
Products of the WeekIn-depth analysis of the latest enterprise strategies, start-ups to watch, people to know, and more.

9 hot technologies for '09
9 hot technologies for '09Our annual rundown, plus a tip or two about how to approach each hot technology.

Sponsored by Oracle
rule

Successfully Manage a Secure Database.
Database professionals are invited to join this Oracle Live Webcast on Thursday, February 5 at 2:00 p.m. ET/11:00 a.m. PT. Gain a better understanding of database security and how to more strategically work with security administrators. Don't miss out. Register for this live webcast now

rule

Preparing for the Next Cyber Attack.
Ensure you are up-to-speed on the latest security technologies available to keep your network safe in this Executive Guide. Get a thorough assessment of the corporate security threat landscape. Protect your network with data leakage protection, NAC and other technologies explained in this report.
Download this Executive Guide now.


Successfully Manage a Secure Database.
Database professionals are invited to join this Oracle Live Webcast on Thursday, February 5 at 2:00 p.m. ET/11:00 a.m. PT. Gain a better understanding of database security and how to more strategically work with security administrators. Don't miss out.
Register for this live webcast now.

 

01/22/09

Today's most-read stories:

  1. Court rules Kentucky does not own the Internet
  2. Juniper expected to cut jobs amid weak demand
  3. Belkin fake reviews case raises broad questions
  4. How to protect your PC against the Downadup worm
  5. Sony: There's no way Xbox 360 will win in the end
  6. WLAN sniffers pass the sniff test
  7. F5 attempts to lure Nortel Alteon customers
  8. Cisco CTO could be tapped by Obama
  9. Top 10 YouTube hacking videos
  10. Obama's BlackBerry equals national security threat


The Evolution of Network Security
Zero in on the hottest security technologies you need to know about in this Executive Guide. Better protect your IT environment with NAC, data leakage prevention controls and auditing tools.
Learn more.



IT Buyers guide

 


This email was sent to networking.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: