Tuesday, March 10, 2009

Business size and NAC needs

The NAC needs of smaller businesses differ from those of enterprises
Network World logo

Security: Network Access Control Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Oracle
rule

Cost-Efficient IT Security.
Make the most of IT security and compliance dollars by ensuring your databases are secure. Get concrete tips and recommendations in this Live Webcast sponsored by Oracle, scheduled for Thursday, April 16, 2009 at 2:00 p.m. ET/11:00 a.m. PT. Learn how to cost-effectively safeguard sensitive and regulated information. Register for this Live Webcast now.

rule

Spotlight Story
Business size and NAC needs

Tim Greene By Tim Greene
As NAC matures, it is becoming clear that the needs of smaller businesses and those of enterprises call for different solutions. Read full story

Tim Greene is senior editor at Network World.

Related News:

Cisco NAC Solution receives Common Criteria EAL2+ Certification CloseThe Cisco Network Admission Control (NAC) solution including the NAC Appliance, NAC Network Module for Cisco Integrated Services Routers (ISRs), NAC Agent, NAC Profiler, and Cisco Secure Access Control Server (ACS) just received Common Criteria EAL2+ Certification. This certification assures customers that Cisco’s NAC solution has gone through a rigorous analysis and testing process and conforms to standards sanctioned by the International Standards Organization. Common Criteria certification is part of an international standard that has been in effect since 1999 and is in use by 25 countries.

Juniper introduces Adaptive Threat Management Juniper is this week introducing software that lets security platforms – even those made by other vendors – share and analyze log information in order to determine the root cause of network problems and fix them.

NAC market continues to evolve The NAC market continues to evolve, including the necessary and sometimes painful process of consolidation.

Take the complexity out of firewall configuration changes As network security infrastructure grows larger and more complex, the likelihood of omissions and misconfigurations that can lead to data breaches and other serious problems is a growing concern. Tufin Technologies has solutions for security lifecycle management that take the human judgment factor out of firewall and router configuration changes. Read about the tools that reduce the risk level that's inherent in security configuration changes.

Enter for a Microsoft training giveaway from New Horizons
New Horizons Computer Training is offering a free Microsoft training course worth up to $2,500 to be given to one lucky Microsoft Subnet reader. Deadline for entry is March 31.

Network World on Twitter Get our tweets and stay plugged in to networking news.


Best of the Tests 2009
Best of the Tests 2009Out of the more than 150 products tested, a baker's dozen rise to the top of the list.

Fave Raves
2009 Fave RavesSix readers dish on their must-have network products, from desktop systems to wireless access points.

Sponsored by Oracle
rule

Cost-Efficient IT Security.
Make the most of IT security and compliance dollars by ensuring your databases are secure. Get concrete tips and recommendations in this Live Webcast sponsored by Oracle, scheduled for Thursday, April 16, 2009 at 2:00 p.m. ET/11:00 a.m. PT. Learn how to cost-effectively safeguard sensitive and regulated information. Register for this Live Webcast now.

rule

Webcast: Data center server selection.
Forrester Research's Brad Day helps IT professionals refine their server selection criteria in this informative Webcast, "Beyond Systems Performance." Ensure you will make the right decision for your next-generation data center. Get Day's tips on creating a cost-efficient environment that delivers the performance and long-term resiliency you require.
Watch this Webcast now.


A Simplified Data Center - Live March 12
Contain costs and improve efficiency and reliability by simplifying your data center architecture. On March 12, data center design and implementation experts share in-depth advice on new approaches and examples of deployments - including price, performance and savings.
Register today for this Live Webcast.

 

03/10/09

Today's most-read stories:

  1. Microsoft Windows on a mainframe?
  2. Symantec identifies third Downadup/Conflicker variant
  3. Vendors face off in 11n 'challenge'
  4. Exchange alternatives: Pros and cons
  5. Microsoft confirms IE8 kill switch in Windows 7
  6. Facebook redesign may earn thumbs down from ordinary users
  7. Juniper introduces Adaptive Threat Management
  8. Vivek Kundra named America's CIO
  9. Bathrooms become smarter with touch screens
  10. U.S. loses IPv6 leader
  11. Microsoft TechFest: Commute UX dialog system for in-car infotainment


Network World on Twitter: Get our tweets and stay plugged in to networking news


Preparing for the Next Cyber Attack.
Ensure you are up-to-speed on the latest security technologies available to keep your network safe. Get a thorough assessment of the corporate security threat landscape. Protect your network with data leakage protection, NAC and other technologies.
Download this Executive Guide now.



IT Buyers guide

 


This email was sent to networking.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: