From mobile devices to insecure wireless modems, users have myriad options for connecting to -- and infecting -- the enterprise network, making network access control (NAC) technologies and policies essential for every enterprise security strategy.
This multi-part NAC security
TABLE OF CONTENTS
Insecure endpoints can open your network up to a plethora of threats. Learn more about enterprise endpoint protection strategies and best practices, including how to use endpoint fingerprinting and how to solve issues and problems related to having insecure endpoints.
Ensuring and maintaining a secure network architecture is an essential step in every enterprise’s network access security strategy. Get advice for creating a secure network architecture by incorporating DMZ and VLAN security best practices, including identifying and preventing VLAN attacks.
Looking to purchase a NAC product? Before making a purchase, every enterprise should have a NAC deployment strategy and NAC guidelines in place. Learn more about network access protection policy and deployment guidelines and best practices for creating a network access control policy.
Remote employees can open an enterprise to a variety of threats, and managing them is never an easy task. Learn best practices for managing remote workers, advising employees on how to set up a secure home network and guidelines for conducting a remote access audit.
This was first published in March 2012