Thursday, March 26, 2009

A hidden chore of deploying NAC

Autmating an audit of what is attached to every switch port and access point on the network
Network World logo

Security: Network Access Control Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Oracle
rule

Live Webcast: Maximizing your IT security dollars
Make the most of IT security and compliance dollars by ensuring your databases are secure. Get concrete tips and recommendations in this Live Webcast sponsored by Oracle, scheduled for Thursday, April 16, 2009 at 2:00 p.m. ET/11:00 a.m. PT. Learn how to cost-effectively safeguard sensitive and regulated information. Register for this Live Webcast now.

rule

Spotlight Story
A hidden chore of deploying NAC

Tim Greene By Tim Greene
One of the great hidden chores of deploying NAC is finding all the devices that are attached to the network, even those that can't authenticate. Read full story

Tim Greene is senior editor at Network World.

Related News:

NAC remediation options When NAC was conceived, it had everything to do with finding out if endpoints met security checks, but not so much about what to do about it.

NAC as a compliance tool NAC is mainly pushed as a risk-mitigation technology that can reduce the likelihood that an endpoint is infected or carrying out unauthorized activity, but its features have been pressed into other duties.

Business size and NAC needs As NAC matures, it is becoming clear that the needs of smaller businesses and those of enterprises call for different solutions.

Tufin adds white lists to firewall management platform Tufin Technologies is upgrading its firewall-management software to include white listing as a way to determine what types of traffic are allowed through corporate firewalls and as a means of safeguarding essential business functions.

Expert cites "major problem" with security policy compliance Attendees at this week's SecureWorld Boston conference got a stern talking-to Wednesday morning: Keynoter Charles Cresson Wood said organizations need to get their information security policies in order or risk going down the tubes

8 Great Free Security Tools Your PC is under attack on all fronts.

Enter for a Microsoft training giveaway from New Horizons
New Horizons Computer Training is offering a free Microsoft training course worth up to $2,500 to be given to one lucky Microsoft Subnet reader. Deadline for entry is March 31.

Network World on Twitter Get our tweets and stay plugged in to networking news.


App to no good
10 iPhone apps that could get you into troubleA look at the top 10 iPhone apps that could get you into trouble.

CEO payday breakdown
CEO payday: How much tech chiefs made in '08A detailed account of how much tech chiefs made in 2008.

Sponsored by Oracle
rule

Live Webcast: Maximizing your IT security dollars
Make the most of IT security and compliance dollars by ensuring your databases are secure. Get concrete tips and recommendations in this Live Webcast sponsored by Oracle, scheduled for Thursday, April 16, 2009 at 2:00 p.m. ET/11:00 a.m. PT. Learn how to cost-effectively safeguard sensitive and regulated information. Register for this Live Webcast now.

rule

Case Study: Successful LAN Support
Successfully deploy a wired/wireless Ethernet network and keep it running with exceptional up-time. Ensure your network is ready for new technologies by running assessment tests that provide you with the data you need. Resolve connectivity issues and quickly address network performance complaints. Get all of the details today.
Download this whitepaper now.


What you need to see all 7 layers
Get all the tools you need to see all 7 layers of your network. Fluke's OptiView Analyzer combines protocol analysis, active discovery, and device and traffic analysis in a mobile solution, giving you the information you need to control your network and minimize disruption.
Click here for your free trial.

 

03/26/09

Today's most-read stories:

  1. CEO payday: How much tech chiefs made in '08
  2. Melissa virus turning 10 ... (age of the stripper unknown)
  3. Hidden commands
  4. Linux penguin mascot gives way to Tuz
  5. What is Nortel up to?
  6. 10 great free sites and downloads
  7. Eight great free security tools
  8. Strike looms for AT&T
  9. Microsoft to present open source blueprint for down economy
  10. Microsoft again delays identity management server
  11. Students learn through robot battles


Network World on Twitter: Get our tweets and stay plugged in to networking news


The Need for an Adaptive Threat Management Architecture - Live March 31.
Create a more secure and efficient network. Find out how in this Live Webcast, "The Need for an Adaptive Threat Management Architecture." Join us on Tuesday, March 31, 2009, at 1:00 p.m. ET/10:00 a.m. PT. Get real-world advice from Jon Oltsik, senior analyst at consulting firm Enterprise Strategy Group.
Register today for this Live Webcast.



IT Buyers guide

 


This email was sent to networking.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: