Pro+ Content/Information Security magazine

Thank you for joining!
Access your Pro+ Content below.
June 2006

Exploring your Endpoint Protection Options

The roads to endpoint security are confusing. Here's some direction. @exb @exe Endpoint security is arguably the hot information security topic in 2006-- small wonder. No matter how diligently you defend your perimeter, roaming laptops are bound to introduce worms, viruses and spyware into your network. The mobility of commodity laptops equipped with wireless adapters has set your workforces free to work productively at home and on the road, as well as in the office. Consultants and vendors can plug into your networks for an hour or a day--how do you protect yourself against what they may bring in? The two behemoths of network infrastructure and OS software, Cisco Systems and Microsoft, each have initiatives to ensure that endpoint devices comply with security policies before they are admitted to the corporate network. Not surprisingly, Cisco's Network Access Control (NAC) depends on the Cisco switching infrastructure, and Microsoft's Network Access Protection (NAP) works through Windows OSes. In addition to these pervasive yet ...

Access this Pro+ Content for Free!

By submitting you agree to recieve email from TechTarget and its partners. If you reside outside of the United States you consent to having your personal data transferred and processed in the United States. Privacy Policy

Features in this issue

Columns in this issue

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

-ADS BY GOOGLE

Close