Thursday, January 29, 2009

Main NAC use: Guest enforcer

80% of NAC is deployed to keep guests and contractors under control
Network World logo

Security: Network Access Control Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Oracle
rule

Successfully Manage a Secure Database.
Database professionals are invited to join this Oracle Live Webcast on Thursday, February 5 at 2:00 p.m. ET/11:00 a.m. PT. Gain a better understanding of database security and how to more strategically work with security administrators. Don't miss out. Register for this live webcast now

rule

Spotlight Story
Main NAC use: Guest enforcer

Tim Greene By Tim Greene
NAC is used mainly to keep guests and contractors under control when they connect to corporate networks, according to a new Gartner study. Read full story

Tim Greene is senior editor at Network World.

Related News:

Businesses use NAC for something other than what it was designed for Few customers of network access control use it for what it was intended, preferring instead to deploy the security technology to keep guests and contractors away from corporate production networks, according to a new report.

The expanding definition of NAC The Forrester report referenced in the last newsletter says that the expanding definition of NAC will result in more features more widely adopted by NAC vendors next year.

Hybrid NAC solutions Forrester is out with another NAC report, this one urging customers not to lock in on a single architecture because they are likely to want a hybrid over time.

Getting more than you bargained for with NAC NAC is supposed to do a lot of things, and once it's installed customers are finding that often NAC does even more than they bargained for.

What's the Conficker worm got to do with NAC? The Conficker worm doesn't directly have anything to do with NAC, but as is the case when any pervasive attack becomes high profile, vendors leap in to point out how their products could have prevented the problem.

Eliminating P2P headaches with NAC Peer-to-peer music sharing is one of the biggest friends to NAC as a business.

Must-dos for evaluating NAC gear Anyone deploying NAC needs to test the products they are considering, and here are a few must-do tests for comparison.

January giveaways from Cisco Subnet and Microsoft Subnet
Up for grabs: Two Cisco training courses from Skyline-ATS worth up to $6,990, a Microsoft training course from New Horizons worth up to $2,500, 15 copies each of the hot book titles Microsoft SQL Server 2008 Management and Administration, IPv6 Security and Chained Exploits: Advanced Hacking Attacks. Get all the entry details here.


Betting on SuperNAP
In Las Vegas, data center takes power and cooling to the limitIn Las Vegas, data center takes power and cooling to the limit.

Data gone missing
10 woeful tales of data gone missing10 woeful tales involving backup tapes: some current, some classic and one just plain unusual.

Sponsored by Oracle
rule

Successfully Manage a Secure Database.
Database professionals are invited to join this Oracle Live Webcast on Thursday, February 5 at 2:00 p.m. ET/11:00 a.m. PT. Gain a better understanding of database security and how to more strategically work with security administrators. Don't miss out. Register for this live webcast now

rule

Preparing for the Next Cyber Attack.
Ensure you are up-to-speed on the latest security technologies available to keep your network safe in this Executive Guide. Get a thorough assessment of the corporate security threat landscape. Protect your network with data leakage protection, NAC and other technologies explained in this report.
Download this Executive Guide now.


Successfully Manage a Secure Database.
Database professionals are invited to join this Oracle Live Webcast on Thursday, February 5 at 2:00 p.m. ET/11:00 a.m. PT. Gain a better understanding of database security and how to more strategically work with security administrators. Don't miss out.
Register for this live webcast now.

 

01/29/09

Today's most-read stories:

  1. Online privacy tips for teens . . . and the adults who ignore them
  2. FTC slaps Do Not Call violators with $1.2 million in penalties
  3. Fallout 3: Operation Anchorage DLC now available
  4. Cisco sets data center blast
  5. HP readies for Cisco's data center assault
  6. New Data Center: storage
  7. Cisco delivers security, storage, UC for small business
  8. Downadup/Conflicker worm: When will the next shoe fall?
  9. Cisco acquires building systems specialist
  10. New botnet resurrects Storm's Valentine's Day ruse


The Evolution of Network Security
Zero in on the hottest security technologies you need to know about in this Executive Guide. Better protect your IT environment with NAC, data leakage prevention controls and auditing tools.
Learn more.



IT Buyers guide

 


This email was sent to networking.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: