Businesses use NAC for something other than what it was designed for Few customers of network access control use it for what it was intended, preferring instead to deploy the security technology to keep guests and contractors away from corporate production networks, according to a new report. The expanding definition of NAC The Forrester report referenced in the last newsletter says that the expanding definition of NAC will result in more features more widely adopted by NAC vendors next year. Hybrid NAC solutions Forrester is out with another NAC report, this one urging customers not to lock in on a single architecture because they are likely to want a hybrid over time. Getting more than you bargained for with NAC NAC is supposed to do a lot of things, and once it's installed customers are finding that often NAC does even more than they bargained for. What's the Conficker worm got to do with NAC? The Conficker worm doesn't directly have anything to do with NAC, but as is the case when any pervasive attack becomes high profile, vendors leap in to point out how their products could have prevented the problem. Eliminating P2P headaches with NAC Peer-to-peer music sharing is one of the biggest friends to NAC as a business. Must-dos for evaluating NAC gear Anyone deploying NAC needs to test the products they are considering, and here are a few must-do tests for comparison. January giveaways from Cisco Subnet and Microsoft Subnet Up for grabs: Two Cisco training courses from Skyline-ATS worth up to $6,990, a Microsoft training course from New Horizons worth up to $2,500, 15 copies each of the hot book titles Microsoft SQL Server 2008 Management and Administration, IPv6 Security and Chained Exploits: Advanced Hacking Attacks. Get all the entry details here. |
No comments:
Post a Comment