Considering NAC's expanded uses Those considering NAC and even those who have already bought it might want to consider expanding its use, according to a recent Gartner report. Software agents as management tools for NAC The argument goes you can never control network access for a desktop with a software agent because agents can be hacked, and there is no way to know for certain whether one has been compromised. Enforcing regulatory compliance standards with NAC NAC is often used as one tool for enforcing regulatory compliance standards and then proving that the standards were met. SonicWall airs zippy security appliance for small businesses SonicWall is introducing a multi-function security appliance for small businesses that gives five times more throughput than its low-end devices for an extra $200. Microsoft promises integrated, identity-aware security platform In an interview with John “JG” Chirapurath, director of marketing for the Identity & Security (I&S) unit at Microsoft, he discussed Identity Lifecycle Manager 2; Forefront (Stirling); Intelligent Application Gateway SP2 and Microsoft's vision for a comprehensive, identity aware platform. Secure Software: 'See No Evil' is Not a Strategy It has been written that data is the new gold, the new oil, the new currency, and even the new crown jewels. It has become very popular to write about, and to capitalize upon, data as the new medium through which commerce is done. Unfortunately, while gold is typically transported in high security vehicles between highly secured facilities, and while no expense is spared in protecting national money supplies from theft and forgery, data is not managed this way, it is handled by software. This is software written twenty years ago for mainframes in sealed rooms, or software written by brilliant but unseen open source programmers to provide low-cost high-grade functionality, or software written by individuals with little formal secure programming training, looking to improve user experience and corporate profitability. Every major organization, enterprise, and government in the world relies on software, and there is virtually no consensus on what it means to have secure software, how to January giveaways from Cisco Subnet and Microsoft Subnet Up for grabs: Two Cisco training courses from Skyline-ATS worth up to $6,990, a Microsoft training course from New Horizons worth up to $2,500, 15 copies each of the hot book titles Microsoft SQL Server 2008 Management and Administration, IPv6 Security and Chained Exploits: Advanced Hacking Attacks. Get all the entry details here. |
No comments:
Post a Comment