Access "Exploring your Endpoint Protection Options"
This article is part of the June 2006 issue of Is your data safe from next-generation attackers?
The roads to endpoint security are confusing. Here's some direction. @exb @exe Endpoint security is arguably the hot information security topic in 2006-- small wonder. No matter how diligently you defend your perimeter, roaming laptops are bound to introduce worms, viruses and spyware into your network. The mobility of commodity laptops equipped with wireless adapters has set your workforces free to work productively at home and on the road, as well as in the office. Consultants and vendors can plug into your networks for an hour or a day--how do you protect yourself against what they may bring in? The two behemoths of network infrastructure and OS software, Cisco Systems and Microsoft, each have initiatives to ensure that endpoint devices comply with security policies before they are admitted to the corporate network. Not surprisingly, Cisco's Network Access Control (NAC) depends on the Cisco switching infrastructure, and Microsoft's Network Access Protection (NAP) works through Windows OSes. In addition to these pervasive yet proprietary approaches, ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
Network Access Control: StillSecure's Safe Access 4.1
StillSecure's Safe Access 4.1
-
Hot Pick: BlueCat Networks' Adonis 1000
BlueCat Networks' Adonis 1000
-
Today's Attackers Can Find the Needle
EMERGING THREATS From massive botnets to targeted phishing and transacting Trojans, today's new breed of attacker is more dangerous than ever.
-
Intrusion Prevention: McAfee's IntruShield 3000
McAfee's IntruShield 3000
-
Unified Threat Management Guide for Managers
SPECIAL It's a firewall, it's an IPS, it's antivirus, it's antispam…but is it right for you?
-
Extrusion Detection: Security Monitoring for Internal Intrusions
Read a review of the security book Extrusion Detection: Security Monitoring for Internal Intrusions.
-
Network Access Control: StillSecure's Safe Access 4.1
-
-
Biometrics
by WhatIs.com
This is a definition of biometrics by sister site whatis.com.
-
Configuration Management: FullArmor's FullArmor PolicyPortal
FullArmor's FullArmor PolicyPortal
-
Recent releases: Security product briefs, June 2006
Learn about the security products released in June 2006.
-
Reworking Risk Policy
POLICIES Whether you manage policies manually or use automated tools, it is imperative to get your policies and systems in sync.
-
Exploring your Endpoint Protection Options
Understand your options for building an endpoint security solution. Get advice on network access control (NAC), Network Access Protection, endpoint security policy definition, enforcement and detection.
-
Biometrics
by WhatIs.com
-
Columns
-
Perspectives: Security training must be a visual, interactive experience
Security awareness training exercises must be interactive and visually stimulating, and must help users judge the validity and reliability of websites and web content.
-
On The Radar: Preparing for managed security services
Reality Check
-
Editor's Desk: Debating a national data protection law
Wanted: Federal Legislation
-
Ping: Don Ulsch
Don Ulsch
-
Perspectives: Security training must be a visual, interactive experience
More Premium Content Accessible For Free
Next-generation firewalls play by new rules
E-Zine
Firewalls started their journey to the next generation at about the same time as the Star Trek TV series. While the products have advanced with ...
Developing your endpoint security management transition plan
E-Handbook
This TechGuide will help you develop your endpoint security management transition plan. Articles focus on overcoming the challenges of Web-based ...
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Security Management Strategies for the CIO