Companies Finding a Place for Maturing NAC Projects


This article can also be found in the Premium Editorial Download "Information Security magazine: Lessons learned from good and bad NAC implementations."

Download it now to read this article plus other related content.


Endpoint Insight

    Requires Free Membership to View

It gives us tremendous insight about the state of the security policy of each individual PC.
--John Endahl, senior information security administrator, TechTeam

Contractor Control
We have audit trails of where every user is going. That helps with HIPAA compliance and post-mortem.
--Justin Gerharter, senior systems engineer, GEHA

Centralized Management
I can enforce hotfixes, virus protection and firewalls all from the same console and series of group policies.
--Brad Myrvold, manager of desktop technology, Allina

Lie Detector
We discovered that by controlling access to the endpoint, we control who has access to the network.
--Chris Cahalin, manager of network operations, Papa Gino's

For seven NAC tips, go to searchsecurity.com.

This was first published in September 2008

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: