Access "Perspectives: Post-admission controls the next step for NAC"
This article is part of the January 2007 issue of Keep today's threats close and tomorrow's closer
Post-admission controls would shore up NAC/NAP shortcomings. If anything, the endpoint security story has been one of how the marketing power of industry giants can stall customer purchase decisions. Cisco Systems' Network Admission Control (NAC) and Microsoft's Network Access Protection (NAP) initiatives both emphasize pre-admission control, quarantining non-compliant endpoints to protect against attacks. It has taken the collective voice of small endpoint security vendors to raise awareness of the greater demand for post-admission control. After all, blocking people is easy; the hard job is finding ways to safely conductbusiness when the unmanaged endpoint of a business partner or customer is not up to snuff. Customers I talk to want more out of NAC/NAP, and many are holding off on the technologies until they can get it. The problem is how to handle customer or partner devices that cannot be quarantined or forced to comply with a higher security standard than that which their organizations require. Asking third parties to install software to conduct ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
How to setup and configure syslog to view and filter data
Your network devices are trying to tell you that you're under atta ck. Syslog helps you sort through the data overload and get the message.
-
SonicWALL SSL VPN 4000 product review
In this product review of SonicWALL SSL VPN 4000 security tool and appliance get information on setup, pricing, configuration, installation, remote access and policy features.
-
UTM product review: WatchGuard Technologies' Firebox X 1250e
WatchGuard Technologies' Firebox X 1250e
-
Identity Management: Apere's IMAG 500
Apere's IMAG 500
-
Mixed Signals
by Mark Baard
RFID gives businesses-and bad guys-an easy way to track and change information.
- View Point
-
How to setup and configure syslog to view and filter data
-
-
Core Security Technologies Core Impact 6.0 security tool review
In this product review, learn how Core Security Core Impact 6.0 tool can assist in ethical hacking a penetration testing, and get info on setup, reporting and management.
-
Virtual Threats
by Dennis Fisher
Virtual machines save you money in the data center, but can you ignore their security implications any longer?
-
Recent Releases: Security product briefs, January 2007
Read about the security products that launched in January 2007.
- At Your Service: January 2007 managed services security news
-
Face-Off: Schneier, Ranum debate privacy and personal information
Does Secrecy Help Protect Personal Information?
-
Who's There?
Enterprises have a pressing need for endpoint security, but choosing a system that screens PCs before allowing them network access requires careful consideration.
-
Core Security Technologies Core Impact 6.0 security tool review
-
Columns
-
Ping: Nikk Gilbert
Nikk Gilbert
-
Editor's Desk: Celebrating 10 years of Information Security magazine
A Toast to Ten Years
-
Face-Off: Schneier, Ranum debate privacy and personal information
Does Secrecy Help Protect Personal Information?
-
Perspectives: Post-admission controls the next step for NAC
Post-admission controls would shore up NAC/NAP shortcomings.
-
Ping: Nikk Gilbert
More Premium Content Accessible For Free
Next-generation firewalls play by new rules
E-Zine
Firewalls started their journey to the next generation at about the same time as the Star Trek TV series. While the products have advanced with ...
Developing your endpoint security management transition plan
E-Handbook
This TechGuide will help you develop your endpoint security management transition plan. Articles focus on overcoming the challenges of Web-based ...
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Security Management Strategies for the CIO