Access "NAC best practices and technologies to meet corporate security policy"
This article is part of the June 2004 issue of Exposed: Why your AV software is failing to protect you
Endpoint devices -- laptops, SOHO desktops, public terminals, etc. -- are your biggest security headache. Traveling employees log in without updated AV signatures or the latest OS patches. Home workers may have no AV or firewall protection. And who knows what unauthorized software and spyware are on connecting PCs? Users jacked into your LAN may not be much better off. Even the most up-to-date patching will lag behind the spread of worms and viruses. According to Gartner, 90 % of cyber-attacks through 2005 will involve known vulnerabilities for which a patch or remedy already exists. Policy notwithstanding, internal employees and contractors disable AV scanners, fiddle with registry settings and run Kazaa and Quake on your network. IT security staffers are often skeleton crews that can't keep up with basic patching, much less play cop with noncompliant employees and machines. The secure master build installed on each computer before it's released is often rendered obsolete by the latest vulnerability and exploit. No wonder the number of endpoint security ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
Antivirus software comparison, 2004: Not all AV products are equal
Your desktop AV may be leaving you wide open to attack.
-
NAC best practices and technologies to meet corporate security policy
by Curtis Dalton, CISSP
New solutions help you secure endpoints
-
Antivirus software comparison, 2004: Not all AV products are equal
-
-
Physical and IT Security: Overcoming Security Convergence Challenges
Physical and IT security convergence seems just one leap away...and may remain that way. Learn how to overcome security integration challenges.
-
Six Sigma and CMM models offer security best practices
Security can learn a lot from Six Sigma, CMM and other established business methodologies.
-
Physical and IT Security: Overcoming Security Convergence Challenges
-
Columns
-
Unintentional benefits: Attackers force search for better Trojan virus protection
by Lawrence M. Walsh
Editor Lawrence M. Walsh says creative attackers are unintentionally aiding the search for better security defenses.
-
Firewall and system logs: Using log file analysis for defense
by Marcus Ranum
Log analysis is the most under-appreciated, unsexy aspect of infosecurity, yet Marcus Ranum says it's one of the most important.
-
Prevent data loss, theft with secure data outputs
by Pete Lindstrom, Contributor
To secure data outputs, some organizations are going a step further by deploying data protection systems for specific applications.
-
Linux malware: Challenges of the Linux worm
Should Linux users brush off concerns about malware plagues? Short answer: No. Learn more about Linux malware and the challenges posed by the Linux worm.
-
Internal security controls and business continuity go hand in hand
Learn the top four quality of security beliefs and see why better security means better quality.
-
Unintentional benefits: Attackers force search for better Trojan virus protection
by Lawrence M. Walsh
More Premium Content Accessible For Free
Next-generation firewalls play by new rules
E-Zine
Firewalls started their journey to the next generation at about the same time as the Star Trek TV series. While the products have advanced with ...
Developing your endpoint security management transition plan
E-Handbook
This TechGuide will help you develop your endpoint security management transition plan. Articles focus on overcoming the challenges of Web-based ...
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Security Management Strategies for the CIO