Email Alerts
-
Lessons learned from good and bad NAC implementations
In this month's issue of Information Security magazine, four companies dish on the good, the bad and the ugly of their NAC implementations. Get the inside scoop on NAC implementations, and mistakes to avoid, as well as other advice from our experts. ... E-Zine
-
Managing BYOD endpoint security
This Security School will break down those challenges and help you develop and over-arching security strategy that cuts across the myriad threats and platforms inside your organization. partOfGuideSeries
-
BYOD security strategies: Balancing BYOD risks and rewards
Allowing employee-owned mobile devices doesn’t have to mean accepting all BYOD risks. Infosec pros share their BYOD security strategies. Feature
-
Considerations for antimalware deployments
Early antivirus products were host-based agents that used basic signature detection to scan hard drives for malicious code. Today’s antimalware is more sophisticated with enterprises operating not only within the network perimeter, but on mobile devi... partOfGuideSeries
-
NAC security guide: How to achieve secure network access in the enterprise
This multi-part network access control (NAC) security guide covers a variety of NAC-related topics, offering tips and expert advice on how to thoroughly secure network access to the enterprise. Learning Guide
-
Managing remote employees: How to secure remote network access
This SearchSecurity.com mini learning guide is a compilation of tips from our experts on how to secure remote network access. The guide offers best practices for managing remote employees and helping them set up a secure home network, as well as what... Tutorial
-
NAC protection: Network access control policy, deployment guidelines
This SearchSecurity.com mini learning guide is composed of a variety of content, all discussing network access protection guidelines, including best practices for creating a network access control policy and NAC deployment. Tutorial
-
NAC security guide: How to achieve secure network access in the enterprise
This multi-part network access control (NAC) security guide covers a variety of NAC-related topics, offering tips and expert advice on how to thoroughly secure network access to the enterprise. Tutorial
-
Endpoint protection advice: Improving NAC with secure endpoints
This endpoint protection tutorial discuss several aspects of endpoint protection, including how to use endpoint fingerprinting, how to create an endpoint security lifecycle, how to solve problems related to insecure endpoints. Tutorial
-
Strengthening policies for endpoint control
This security school explores new strategies, policies, practices and tools that can be used to reign in unruly endpoints. Learn how to avoid mistakes, inventory your organization's exposures and apply stronger endpoint controls. partOfGuideSeries
-
Best Network Access Control Products 2011
Readers vote for the best NAC products, including appliance, software and infrastructure user and device network access policy creation, compliance, enforcement and remediation. Guide
- See more Essential Knowledge on Network Access Control Basics
-
ArcSight SIEM integration brings opportunities for ForeScout partners
ForeScout’s NAC product may now be integrated into ArcSight’s SIEM platform. This could open doors for ForeScout partners into ArcSight accounts. News | 16 Sep 2011
-
Software fraud, phony electronic parts pose serious security risks, expert says
Hardware and software fraud pose serious threats according to a supply chain expert who says the lack of security is flooding the market for fraudulent devices and parts. Article | 15 Feb 2011
-
Security vendors can learn from ConSentry Networks demise
The switch-oriented NAC vendor serves as a sad reminder that security often only has niche appeal, says security expert Eric Ogren. Column | 09 Sep 2009
-
Symantec offers endpoint protection management, monitoring services
Symantec responds to pain points of managing endpoint protection with two managed services to help deploy and maintain antivirus, NAC products and endpoint security suites. Article | 23 Jun 2009
-
Opinion: Gartner gets NAC wrong, again
Columnist Eric Ogren has harsh words for Gartner following the recent release of its NAC magic quadrant report. The reality, Ogren writes, is that NAC isn't maturing; it's already half dead. Column | 22 Apr 2009
-
Trustwave acquires NAC appliance vendor Mirage Networks
Trustwave said it would wrap Mirage's NAC technology into its managed security services. Article | 18 Feb 2009
-
Network access control poised for a comeback by aiming small
Network access control (NAC) vendors are focusing on specific use cases rather than offering total security solutions. News | 29 Oct 2008
-
McAfee adds NAC module, appliance for unified policy enforcement
McAfee addresses its NAC gaps while customers seek ways to meld network and endpoint security technologies. Article | 20 Oct 2008
-
Sophos finds patching issues through endpoint NAC tool
Companies using Sophos' Endpoint Assessment Test are discovering missing security patches, misconfigured firewalls and missing OS updates. Article | 17 Jun 2008
-
Forrester: NAC ready for wider deployments
With vendor consolidation subsiding, NAC technologies are maturing and ready for full scale deployments. Article | 01 May 2008
- See more News on Network Access Control Basics
-
Unmanaged endpoints? Rethink the defense-in-depth security model
Today's endpoint security model is failing. What's next? Learn why endpoint defense-in-depth controls must assume the endpoint is compromised. Tip
-
Defense-in-depth security: How to establish an ultra-redundant network
Matthew Pascucci discusses layered security, explaining how to apply defense-in-depth principles toward an ultra-redundant network security posture. Tip
-
After antimalware: Moving toward endpoint antivirus alternatives
Is it time to "cut the cord" with endpoint antimalware? Matthew Pascucci discusses possible antivirus alternatives. Tip
-
Antivirus alternatives: Evolving enterprise endpoint security strategy
Do any viable antivirus alternatives exist? Security expert Matt Pascucci offers an endpoint security strategy that looks beyond AV to fight malware. Tip
-
How application whitelisting can help prevent advanced malware attacks
Advanced malware can be tricky, but application whitelisting on desktops can provide an additional layer of protection against malware attacks. Tip
-
Network access control policy: Handling smartphone access control
NAC can be helpful for laptops and desktops, but it’s limited with mobile devices. In this tip, learn how to extend NAC for smartphone access control. Tip
-
Endpoint fingerprinting: How to improve NAC security for 'dumb devices'
Many enterprises underestimate the potential security problems posed by "dumb devices" like network printers or IP phones. Forrester Research analyst Usman Sindhu explains how endpoint fingerprinting can be used as a NAC add-on to identify and monito... Tip
-
Five NAC-like endpoint settings enforced with group policy
Complexity and cost may keep you from investing in NAC. Fear not, endpoint integrity enforcement, for example, can be achieved through directory group policies. Tip
-
How to help customers choose a network access control product
Learn how to help customers choose the most appropriate NAC product for their environment. David Jacobs explains some variables to consider when choosing a network access control product, including what some large vendors' NAC products have to offer ... Tip
-
Network access control technology: Over-hyped or underused?
Thinking of deploying network access control (NAC) technology in your enterprise, but aren't sure if its capabilities have finally caught up to its hype? In this expert tip, Mike Chapple offers an update on NAC and whether it might be right for your ... Tip
- See more Tips on Network Access Control Basics
-
How to review VoIP phone security amid Cisco IP phone vulnerabilities
In light of recent Cisco IP phone vulnerabilities, expert Brad Casey evaluates VoIP phone security and offers measures to secure VoIP phones. Answer
-
Application whitelisting vs. blacklisting: Which is the way forward?
Which method is better at fighting next-gen malware? Security expert Michael Cobb weighs in on the application whitelisting vs. blacklisting debate. Answer
-
How to create a secure conference room with a WLC/NAC configuration
Conference rooms are often hosts to corporate-owned and guest devices, so what 's the best secure authentication setup? Security pro Anand Sastry weighs in. Ask the Expert
-
What is the difference between a VPN and remote control?
Mike Chapple reviews VPNs, remote controls, and how the two security technologies can be used in tandem. Ask the Expert
-
Configuring access control lists
Network security expert Mike Chapple explains how access control lists (ACLs) can be used to defend against Internet Explorer threats. Ask the Expert
-
What security software should be installed on Internet café computers?
The security provided by many Internet cafes and other similar public access points has greatly improved over the last few years. But that's no substitute for due diligence on the part of users, says expert Michael Cobb. Ask the Expert
-
What are the best network security books?
Security expert Mike Chapple reveals his favorite network security books. Ask the Expert
-
Should the government reduce its external Internet connections?
To reduce its susceptibility to attack, the federal government announced a plan to gradually reduce its number of Internet connections. Mike Chapple explains why the idea is a feasible one that all enterprises can learn from. Ask the Expert
-
The top LAN security issues in a client-server network environment
In this SearchSecurity.com Q&A, network security expert Mike Chapple lays out four of the biggest LAN security threats. Ask the Expert
-
Comparing access control mechanisms and identity management techniques
In the IAM world, what's the difference between access control and identity management. This IAM expert response explains how the two relate as well as some best practices for both access control mechanisams and identity management. Ask the Expert
- See more Expert Advice on Network Access Control Basics
-
endpoint fingerprinting
Endpoint fingerprinting is a feature of enterprise network access control (NAC) products that enables discovery, classification and monitoring of connected devices, including non-traditional network endpoints such as smartcard readers, HVAC systems, ... Definition
-
phreak
A phreak is someone who breaks into the telephone network illegally, typically to make free long-distance phone calls or to tap phone lines. Definition
-
masquerade
In general, a masquerade is a disguise. Definition
-
Kerberos
Kerberos is a secure method for authenticating a request for a service in a computer network. Definition
-
In 2013, Cisco network security product strategy to key on integration
Video: Cisco SVP Chris Young details the vendor's 2013 network security product strategy, specifically combining more features into its line of ASA firewalls. Video
-
The ins and outs of endpoint integrity enforcement
From server-based endpoint security suites and directory-based group policy compliance checks to appliances and network-based access controls like TNC and NAP, this video explores the many endpoint integrity scan, quarantine, and remediation options ... Video
-
Inside the NSA trusted computing strategy
The NSA’s Tony Sager discusses the NSA trusted computing strategy and the importance of finding cost-effective ways to disrupt potential attackers. Video
-
Endpoint integrity enforcement: The ins and outs
Learn about the latest in endpoint integrity enforcement and the questions you should ask vendors and groups within your own organization to stop infected, non-compliant endpoints from threatening your business. Video
-
Perimeter defense in the era of the perimeterless network
When it comes to perimeter defense, identifying the network edge is a challenge in itself. This video offers insight on defending the enterprise in a perimeterless world, including the issues of a perimeterless network and leading technologies for en... Video
-
Making NAC work with your existing security tools
This podcast provides listeners with real-world anecdotes and detailed information on how to overcome obstacles presented by conflicts between your various Network Access Control (NAC) products and other security and networking tools on your network.... Podcast
-
NAC and endpoint security: The hard questions
Joel Snyder covers challenging endpoint security questions and explains how NAC technology can address them. Video
-
Unmanaged endpoints? Rethink the defense-in-depth security model
Today's endpoint security model is failing. What's next? Learn why endpoint defense-in-depth controls must assume the endpoint is compromised. Tip
-
In 2013, Cisco network security product strategy to key on integration
Video: Cisco SVP Chris Young details the vendor's 2013 network security product strategy, specifically combining more features into its line of ASA firewalls. Video
-
How to review VoIP phone security amid Cisco IP phone vulnerabilities
In light of recent Cisco IP phone vulnerabilities, expert Brad Casey evaluates VoIP phone security and offers measures to secure VoIP phones. Answer
-
Application whitelisting vs. blacklisting: Which is the way forward?
Which method is better at fighting next-gen malware? Security expert Michael Cobb weighs in on the application whitelisting vs. blacklisting debate. Answer
-
Managing BYOD endpoint security
This Security School will break down those challenges and help you develop and over-arching security strategy that cuts across the myriad threats and platforms inside your organization. partOfGuideSeries
-
Defense-in-depth security: How to establish an ultra-redundant network
Matthew Pascucci discusses layered security, explaining how to apply defense-in-depth principles toward an ultra-redundant network security posture. Tip
-
BYOD security strategies: Balancing BYOD risks and rewards
Allowing employee-owned mobile devices doesn’t have to mean accepting all BYOD risks. Infosec pros share their BYOD security strategies. Feature
-
After antimalware: Moving toward endpoint antivirus alternatives
Is it time to "cut the cord" with endpoint antimalware? Matthew Pascucci discusses possible antivirus alternatives. Tip
-
Antivirus alternatives: Evolving enterprise endpoint security strategy
Do any viable antivirus alternatives exist? Security expert Matt Pascucci offers an endpoint security strategy that looks beyond AV to fight malware. Tip
-
Considerations for antimalware deployments
Early antivirus products were host-based agents that used basic signature detection to scan hard drives for malicious code. Today’s antimalware is more sophisticated with enterprises operating not only within the network perimeter, but on mobile devi... partOfGuideSeries
- See more All on Network Access Control Basics
About Network Access Control Basics
Learn the basics of network access control (NAC) to achieve secure user access and avoid hacker attacks. Get advice on implementation, deployment, endpoint security software and policies.
Security Management Strategies for the CIO