Thursday, February 05, 2009

IETF standards for NAC in the final stages

Two NAC protocols are up for approval: posture assessment protocol and posture broker protocol
Network World logo

Security: Network Access Control Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Oralce
rule

IDC: Oracle's X Factor: HP Oracle Exadata Storage Server and HP Oracle Database Machine
Oracle's recently announced hardware products, HP Oracle Exadata Storage Server and HP Oracle Database Machine, stand to shake-up the IT industry in several areas. If the product claims and initial disclosures about throughput are affirmed through further testing, customers will be induced to use more Oracle Database for data warehousing by the attraction of a predefined and supported configuration. Read this white paper to learn more about IDC's opinion of the HP Oracle Exadata Storage Server and the HP Oracle Database Machine.

rule

Spotlight Story
IETF standards for NAC in the final stages

Tim Greene By Tim Greene
Internet Engineering Task Force standards for NAC are in their final stages, according to IETF postings. Read full story

Tim Greene is senior editor at Network World.

Related News:

Is your NAC compatible with your switches? Independent NAC vendors make NAC gear that employs network access switches as enforcement points, but before buying, customers should make sure the switches and the particular NAC product are compatible.

Main NAC use: Guest enforcer NAC is used mainly to keep guests and contractors under control when they connect to corporate networks, according to a new Gartner study.

What's the Conficker worm got to do with NAC? The Conficker worm doesn't directly have anything to do with NAC, but as is the case when any pervasive attack becomes high profile, vendors leap in to point out how their products could have prevented the problem.

Must-dos for evaluating NAC gear Anyone deploying NAC needs to test the products they are considering, and here are a few must-do tests for comparison.

GAO finds more security problems in the Treasury Department Data used to fight money-laundering and funding for terrorists is at risk because of significant security weaknesses within the networks used by a crime-fighting arm of the U.S. Treasury Department, according to a government study.

February giveaways from Cisco Subnet and Microsoft Subnet
Up for grabs: One American Express gift card worth $250 from Global Knowledge; One Microsoft training course worth $2,995 from Global Knowledge; 15 copies each of the hot book titles Voice over IP Security, and CCNA Wireless Official Exam Certification Guide and 15 copies of Exchange Server 2007 How-To: Real Solutions for Exchange Server 2007 SP1 Administrators. Get all the entry details here.


Betting on SuperNAP
In Las Vegas, data center takes power and cooling to the limitIn Las Vegas, data center takes power and cooling to the limit.

Hot spot safety tips
Top 10 hot spot safety tipsHow to protect laptop data at your local Wi-Fi hot spot.

Sponsored by Oralce
rule

IDC: Oracle's X Factor: HP Oracle Exadata Storage Server and HP Oracle Database Machine
Oracle's recently announced hardware products, HP Oracle Exadata Storage Server and HP Oracle Database Machine, stand to shake-up the IT industry in several areas. If the product claims and initial disclosures about throughput are affirmed through further testing, customers will be induced to use more Oracle Database for data warehousing by the attraction of a predefined and supported configuration. Read this white paper to learn more about IDC's opinion of the HP Oracle Exadata Storage Server and the HP Oracle Database Machine.

rule

Preparing for the Next Cyber Attack.
Ensure you are up-to-speed on the latest security technologies available to keep your network safe. Get a thorough assessment of the corporate security threat landscape. Protect your network with data leakage protection, NAC and other technologies.
Download this Executive Guide now.


Successfully Manage a Secure Database.
Database professionals are invited to join this Oracle Live Webcast on Thursday, February 5 at 2:00 p.m. ET/11:00 a.m. PT. Gain a better understanding of database security and how to more strategically work with security administrators. Don't miss out.
Register for this live webcast now.

 

02/05/09

Today's most-read stories:

  1. VMware goes open source with desktop virtualization release
  2. Need a supercomputer? This guy builds 'em himself
  3. Optical chip could lead to terabit Ethernet
  4. IBM to build new monster supercomputer
  5. Free BlackBerry Storm downloads
  6. Wi-Fi hot spot horrors
  7. Google executives facing jail in Italy over a video
  8. Juniper switch enables mega-router creation
  9. Is West Wing BlackBerry security possible?
  10. Cellular guys hurl femtocell salvo


Product Guides
Get side-by-side product comparisons, buying tips, market trend information, case studies and more with Network World's Patch Management Product Guide.
Visit now



IT Buyers guide

 


This email was sent to networking.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: