Ensuring an ultra-redundant network security posture

Network Access Control Basics

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Lessons learned from good and bad NAC implementations

    In this month's issue of Information Security magazine, four companies dish on the good, the bad and the ugly of their NAC implementations. Get the inside scoop on NAC implementations, and mistakes to avoid, as well as other advice from our experts. ... 

  • exit interview

    An exit interview is a meeting between management representatives and someone who is leaving an organization. Businesses and other organizations such as educational institutions use exit interviews to gather useful feedback that can help guide future... 

  • endpoint fingerprinting

    Endpoint fingerprinting is a feature of enterprise network access control (NAC) products that enables discovery, classification and monitoring of connected devices, including non-traditional network endpoints such as smartcard readers, HVAC systems, ... 

  • phreak

    A phreak is someone who breaks into the telephone network illegally, typically to make free long-distance phone calls or to tap phone lines. 

  • Kerberos

    Kerberos is a secure method for authenticating a request for a service in a computer network. 

  • masquerade

    In general, a masquerade is a disguise. 

  • In 2013, Cisco network security product strategy to key on integration

    Video: Cisco SVP Chris Young details the vendor's 2013 network security product strategy, specifically combining more features into its line of ASA firewalls. 

  • The ins and outs of endpoint integrity enforcement

    From server-based endpoint security suites and directory-based group policy compliance checks to appliances and network-based access controls like TNC and NAP, this video explores the many endpoint integrity scan, quarantine, and remediation options ... 

  • Inside the NSA trusted computing strategy

    The NSA’s Tony Sager discusses the NSA trusted computing strategy and the importance of finding cost-effective ways to disrupt potential attackers. 

  • Endpoint integrity enforcement: The ins and outs

    Learn about the latest in endpoint integrity enforcement and the questions you should ask vendors and groups within your own organization to stop infected, non-compliant endpoints from threatening your business. 

  • Perimeter defense in the era of the perimeterless network

    When it comes to perimeter defense, identifying the network edge is a challenge in itself. This video offers insight on defending the enterprise in a perimeterless world, including the issues of a perimeterless network and leading technologies for en... 

  • Making NAC work with your existing security tools

    This podcast provides listeners with real-world anecdotes and detailed information on how to overcome obstacles presented by conflicts between your various Network Access Control (NAC) products and other security and networking tools on your network.... 

  • NAC and endpoint security: The hard questions

    Joel Snyder covers challenging endpoint security questions and explains how NAC technology can address them. 

About Network Access Control Basics

Learn the basics of network access control (NAC) to achieve secure user access and avoid hacker attacks. Get advice on implementation, deployment, endpoint security software and policies.