Editor's note: Starting April 6 the Security: Network Access Control Alert will become the Cloud Security Alert to address this growing technology and it's impact on security. We hope you will enjoy this new and improved version. We thank you for reading Network World newsletters. If you wish to update your newsletter subscriptions, please click here. A hidden chore of deploying NAC One of the great hidden chores of deploying NAC is finding all the devices that are attached to the network, even those that can't authenticate. NAC remediation options When NAC was conceived, it had everything to do with finding out if endpoints met security checks, but not so much about what to do about it. NAC as a compliance tool NAC is mainly pushed as a risk-mitigation technology that can reduce the likelihood that an endpoint is infected or carrying out unauthorized activity, but its features have been pressed into other duties. Business size and NAC needs As NAC matures, it is becoming clear that the needs of smaller businesses and those of enterprises call for different solutions. NAC-as-a-service The recent purchase of Mirage Networks by service provider Trustwave raises questions about whether NAC-as-a-service is a viable business. Prevent intrusions: What to look for In the Buying Tips section of our Product Guide, find 15 questions to ask about IPS before you buy one. Enter for a Microsoft training giveaway from New Horizons New Horizons Computer Training is offering a free Microsoft training course worth up to $2,500 to be given to one lucky Microsoft Subnet reader. Deadline for entry is March 31. Network World on Twitter Get our tweets and stay plugged in to networking news. |
No comments:
Post a Comment