Features
Features
Network Access Control technologies
-
How to build an effective IAM architecture
Identity and access management is changing and so must strategies for managing it. Read up on IAM architecture approaches and how to select the best for your organization. Continue Reading
-
Top 3 advantages of smart cards -- and potential disadvantages
As smart card adoption increases, it is prudent to take a closer look at how this technology can improve data security. Here, read more about the benefits of smart cards. Continue Reading
-
Zero-trust management challenges outweighed by benefits
The zero-trust model's adoption, deployment and management challenges are easily outweighed by its ability to offset modern threats, IEEE senior member Jack Burbank advises. Continue Reading
-
Zero-trust model case study: One CISO's experience
Adopting a zero-trust environment was the right move for GitLab, according to the company's former security chief, but it may not be well suited for all enterprises. Continue Reading
-
VMware's internal Service-defined Firewall reimagines firewalling
VMware's internal firewall uses a global view of known-good behavior at the network and host level to minimize the attack surface for on-premises and cloud environments. Continue Reading
-
Defending against the most common wireless network attacks
The most common wireless network attacks change over time, but not that much. Find out which tactics still work for attackers and how to defend against them. Continue Reading
-
Three reasons to implement an NAC system
The growth in devices on the network has heightened the need for network access control products. This article presents scenarios where an enterprise might need an NAC system. Continue Reading
-
An in-depth look at NAC vendors and what they can offer you
BYOD and IoT have intensified the need for NAC products resulting in more NAC vendors for buyers to choose from, based on their needs and what the vendor has to offer. Continue Reading
-
Five questions to ask before purchasing NAC products
Organizations are recognizing the need for network access control systems, but it is important to evaluate and perform research before you invest in enterprise NAC products. Continue Reading
-
Learn what network access control systems can do for you
Network access control systems keep rogue or compromised devices off of corporate networks. See how they work and the other security technologies with which they work. Continue Reading
-
The importance of securing endpoints with antimalware protection
All organizations need to protect their endpoints from outside malware with antimalware products, which are essential to an enterprise-wide security strategy. Continue Reading
-
What endpoint protection software is on your short list?
Roughly half of survey respondents indicated that their organization is shifting away from static scanning as the primary protection for endpoints. Continue Reading
-
Comparing the best network access control products
Expert Rob Shapland takes a look at the best network access control products on the market today and examines the features and capabilities that distinguish the top vendors in this space. Continue Reading
-
Windows 10 Wi-Fi Sense for hotspot sharing: Is it safe?
Microsoft's Windows 10 Wi-Fi Sense was designed to make hotspot sharing easy, but experts debate if the security risks are real and whether the new feature offers substantial benefits and relative safety. Continue Reading
-
Beyond the Page: Network security at the edge
The network perimeter is changing; approaches to network perimeter security must adapt. Here's how to cope with the new security environment. Continue Reading
-
Postcards from the perimeter: Network security in the cloud and mobile era
Security professionals break old boundaries with new network edge protection strategies. Continue Reading
-
BYOD security strategies: Balancing BYOD risks and rewards
Allowing employee-owned mobile devices doesn’t have to mean accepting all BYOD risks. Infosec pros share their BYOD security strategies. Continue Reading
-
How to compartmentalize WiFi traffic with a VLAN
Virtual LANs have long been used within enterprise networks to create logical workgroups, independent of physical location or LAN topology. This tip describes how to use these same VLAN capabilities, found in both wired and wireless devices, to tag ... Continue Reading
-
Life at the edge: Securing the network perimeter
Learn strategies for securing the network perimeter to resist attacks. Continue Reading
-
Special considerations for network-based access control
An excerpt from Chapter 13: Access Control of "Information Security: Design, Implementation, Measurement, and Compliance," by Timothy P. Layton. Continue Reading
-
Infrastructure security: Remote access DMZ
An excerpt from Chapter 7: Infrastructure security from "How to Cheat at Managing Information Security," by Mark Osborne. Continue Reading
-
VPNs and remote access quiz
Take this five-question quiz to see how much you've learned about VPNs and remote access. Continue Reading
-
Home office security: Seven ways to secure remote employees
Fred Avolio outlines seven strategies enterprises should use to ensure their remote employees participate in good home office security. Continue Reading
-
Access control issues: The unsolvable problem
Access control issues can be remedied when properly implemented tools are used and today's developers avoid the mistakes made by their predecessors. Continue Reading