Thursday, March 19, 2009

NAC remediation options

Many NAC vendors offer a spectrum of remediation options from none to fully automated
Network World logo

Security: Network Access Control Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Dell
rule

Migrating Servers to Windows Server 2008
Upgrading to the Windows Server 2008 OS can offer myriad advantages, including enhanced performance, security, and stability. By following best practices for in-place upgrades and taking advantage of tools such as the Dell Windows Server 2008 Readiness Advisor, administrators can help ensure a smooth migration on their Dell PowerEdge(TM) servers.

rule

Spotlight Story
NAC remediation options

Tim Greene By Tim Greene
When NAC was conceived, it had everything to do with finding out if endpoints met security checks, but not so much about what to do about it. Read full story

Tim Greene is senior editor at Network World.

Related News:

NAC as a compliance tool NAC is mainly pushed as a risk-mitigation technology that can reduce the likelihood that an endpoint is infected or carrying out unauthorized activity, but its features have been pressed into other duties.

More vendors supporting Microsoft NAP Partners to Microsoft's flavor of NAC - network access protection or NAP - have grown to about 100, poising the technology for wider use.

Business size and NAC needs As NAC matures, it is becoming clear that the needs of smaller businesses and those of enterprises call for different solutions.

NAC-as-a-service The recent purchase of Mirage Networks by service provider Trustwave raises questions about whether NAC-as-a-service is a viable business.

Main NAC use: Guest enforcer NAC is used mainly to keep guests and contractors under control when they connect to corporate networks, according to a new Gartner study.

FishNet joins with Optenet for SaaS security Two security vendors have joined forces to offer a 'comprehensive' Security-as-a-Service offering for enterprises struggling to deal with the growing complexity of security threats, coupled with the fiscal pressures associated with the current economic downturn.

SonicWall security devices embrace 802.11n A new wireless access point and UTM software enable faster, clean connections

AlgoSec puts its firewall analysis software on an appliance AlgoSec is coming out with an appliance that has its firewall analysis software already installed, giving customers a fourth option for using the company's tools.

Enter for a Microsoft training giveaway from New Horizons
New Horizons Computer Training is offering a free Microsoft training course worth up to $2,500 to be given to one lucky Microsoft Subnet reader. Deadline for entry is March 31.

Network World on Twitter Get our tweets and stay plugged in to networking news.


Exchange alternatives: Pros & cons
Clear Choice Test: Microsoft Exchange alternativesTesting shows Microsoft's Exchange still tops for features and management hooks.

App to no good
10 iPhone apps that could get you into troubleA look at the top 10 iPhone apps that could get you into trouble.

Sponsored by Dell
rule

Migrating Servers to Windows Server 2008
Upgrading to the Windows Server 2008 OS can offer myriad advantages, including enhanced performance, security, and stability. By following best practices for in-place upgrades and taking advantage of tools such as the Dell Windows Server 2008 Readiness Advisor, administrators can help ensure a smooth migration on their Dell PowerEdge(TM) servers.

rule

Preparing for the Next Cyber Attack.
Ensure you are up-to-speed on the latest security technologies available to keep your network safe. Get a thorough assessment of the corporate security threat landscape. Protect your network with data leakage protection, NAC and other technologies.
Download this Executive Guide now.


Webcast: Data center server selection.
Forrester Research's Brad Day helps IT professionals refine their server selection criteria in this informative Webcast, "Beyond Systems Performance." Ensure you will make the right decision for your next-generation data center. Get Day's tips on creating a cost-efficient environment that delivers the performance and long-term resiliency you require.
Watch this Webcast now.

 

03/19/09

Today's most-read stories:

  1. Computer science major is cool again
  2. Report: IBM is in talks to buy Sun
  3. Rootkit to exploit Intel chip flaw to be posted 3/19/09
  4. Apple previews Version 3.0 of iPhone OS
  5. Cisco rivals size up UCS with usual reaction: caveat emptor
  6. Google Voice: GrandCentral grows up!
  7. Road signs hacked in NYC
  8. What Cisco's UCS means to management vendors?
  9. Web inventor Berners Lee conned by fake Web site
  10. A 10-piece sampler from Microsoft's patent pipeline
  11. Students learn through robot battles


Network World on Twitter: Get our tweets and stay plugged in to networking news


The Need for an Adaptive Threat Management Architecture - Live March 31.
Create a more secure and efficient network. Find out how in this Live Webcast, "The Need for an Adaptive Threat Management Architecture." Join us on Tuesday, March 31, 2009, at 1:00 p.m. ET/10:00 a.m. PT. Get real-world advice from Jon Oltsik, senior analyst at consulting firm Enterprise Strategy Group.
Register today for this Live Webcast.



IT Buyers guide

 


This email was sent to networking.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: