Pro+ Content/Information Security magazine

Thank you for joining!
Access your Pro+ Content below.
September 2008

Companies Finding a Place for Maturing NAC Projects

4 ORGANIZATIONS SHARE THE CHALLENGES AND REWARDS OF NAC IMPLEMENTATIONS. Endpoint Insight It gives us tremendous insight about the state of the security policy of each individual PC. --John Endahl, senior information security administrator, TechTeam Contractor Control We have audit trails of where every user is going. That helps with HIPAA compliance and post-mortem. --Justin Gerharter, senior systems engineer, GEHA Centralized Management I can enforce hotfixes, virus protection and firewalls all from the same console and series of group policies. --Brad Myrvold, manager of desktop technology, Allina Lie Detector We discovered that by controlling access to the endpoint, we control who has access to the network. --Chris Cahalin, manager of network operations, Papa Gino's For seven NAC tips, go to searchsecurity.com. Endpoint Insight Global IT support services firm streamlines endpoint security management with centralized system. TechTeam Global delivers global, multilingual help desk services and other specialized IT solutions to...

Access this Pro+ Content for Free!

By submitting you agree to recieve email from TechTarget and its partners. If you reside outside of the United States you consent to having your personal data transferred and processed in the United States. Privacy Policy

Features in this issue

  • Product Review: Workshare Protect Premium 6.0

    Workshare Protect Premium 6.0 seeks to eliminate the malicious or accidental leakage of sensitive corporate data.

  • Security Services: Symantec Online Fraud Protection

    Symantec's Online Fraud Protection service includes an initial on-site assessment, phishing and transaction monitoring, incident response, monitoring of malware targeting the company's brand and analysis of new malware behavior.

  • Product review: AirDefense Enterprise 7.3

    AirDefense's AirDefense Enterprise 7.3, a wireless intrusion detection and intrusion prevention tool, has new features including support for Power over Ethernet (PoE) for its sensors, a new user interface, overhauled reporting and new features such as WEP cloaking, advanced forensics, spectrum analysis and a centralized console to manage appliances.

Columns in this issue

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

-ADS BY GOOGLE

Close