Tuesday, January 06, 2009

Software agents as management tools for NAC

Software agents as management tools that add information about endpoints
Network World logo

Security: Network Access Control Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by AMD
rule

See the power of the new Quad-Core AMD Opteron(TM) processor.
Virtualization is a proven engine that drives business performance. The fusion of the Quad-Core AMD Opteron(TM) processor and virtualization - It's a match made in the data center. Find out more:

rule

Spotlight Story
Software agents as management tools for NAC

Tim Greene By Tim Greene
The argument goes you can never control network access for a desktop with a software agent because agents can be hacked, and there is no way to know for certain whether one has been compromised. Read full story

Tim Greene is senior editor at Network World.

Related News:

Network access control: hot technology for '09 NAC has reached a turning point, with standards battles ended and enterprises ready to deploy to move on to the next step with this security technology.

NetClarity claims its NACs are eco-friendly NetClarity is making the pitch that it is the greenest of the NAC vendors, and maybe it is. It has three points to this claim: the tiny version of its NAC appliance, EasyNAC Micro doesn't use as much electricity as most other NAC boxes; the company buys energy credits with renewable energy groups to offset the power the devices use; and the company’s Endpoint Defender NAC agent includes a tool that enables shutting down unnecessary and power-consuming desktop functions.

NAC won't get its own year This time of year, people make predictions about what the coming year will bring, and in technology circles that comes down to things like, "Next year will be the year of [name the technology]."

Cisco no longer supports third-party VPN links Cisco to customers: We only support ASA IPsec LAN-to-LAN VPNs with other Cisco peers.

Enforcing regulatory compliance standards with NAC NAC is often used as one tool for enforcing regulatory compliance standards and then proving that the standards were met.

Autonomic Networks ARMS your network Recently a reader e-mailed to say that the Web site for former NAC vendor Vernier Networks was up and running again.

2009 security predictions: Deja vu all over again The security industry is fueled largely by FUD (Fear Uncertainty and Doubt.) So it's not unusual for most forecasts in the industry to be full of grim prognostications of imminent chaos and calamities.

Quantum Encryption VPNs - Totally Unhackable The National Institute of Standards and Technology (NIST), with funding from DARPA, has successfully tested a multi-node, 1.25Gbps active network that uses Quantum Encryption.

January giveaways from Cisco Subnet and Microsoft Subnet
Up for grabs: Two Cisco training courses from Skyline-ATS worth up to $6,990, a Microsoft training course from New Horizons worth up to $2,500, 15 copies each of the hot book titles Microsoft SQL Server 2008 Management and Administration, IPv6 Security and Chained Exploits: Advanced Hacking Attacks. Get all the entry details here.


IT Outlook '09
Products of the WeekIn-depth analysis of the latest enterprise strategies, start-ups to watch, people to know, and more.

9 hot technologies for '09
9 hot technologies for '09Our annual rundown, plus a tip or two about how to approach each hot technology.

Sponsored by AMD
rule

See the power of the new Quad-Core AMD Opteron(TM) processor.
Virtualization is a proven engine that drives business performance. The fusion of the Quad-Core AMD Opteron(TM) processor and virtualization - It's a match made in the data center. Find out more:

rule

Effectively Managing Change.
Find the right network/system management platforms that leverage the latest IT technologies in this Executive Guide, "The New Network/System Management Challenges." Get a handle on server sprawl, managing 802.11n wireless LANs, and data center automation tool integration. Confidently deploy innovative technologies that drive efficiencies today.
Download this Executive Guide now.


Executive Guide: Green IT
Download this Network World Executive Guide, "Going Green: Trends, tips and case studies," for timely, real-world advice. By adopting an effective green approach to IT you'll save your company money and even bolster company profits. Find out how to make it happen today.
Download this Executive Guide now.

 

01/06/09

Today's most-read stories:

  1. MacWorld 2009 rumors
  2. Outlook '09
  3. 9 Web sites IT pros should master in '09
  4. Juniper poaching Nortel's channels
  5. 2008's biggest tech crime stories
  6. Management must-dos in 2009
  7. AT&T-Verizon fiber showdown looms
  8. Bold 2009 tech prophesies
  9. Samsung to unveil 7mm thick TV at CES
  10. 2009 will be the year of IP video


Network Security you Need
Zero in on the hottest security technologies you need to know about in this Executive Guide, "The Evolution of Network Security." Stay out in front with the most up-to-date information on network security. Better protect your IT environment with NAC, data leakage prevention controls and auditing tools.
Download this Executive Guide now.



IT Buyers guide

 


This email was sent to networking.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: