E-Book

Securing the new network architecture

The distributed nature of modern networks, combined with the increased focus on applications and business data, makes network security less about locking down a network perimeter and more about controlling user access and behavior and ensuring data safety in a dynamic and mobile environment. Network access control (NAC) is being promoted as the model to which enterprises should aspire, but few are taking the plunge to a full NAC implementation. This ebook chapter discusses intermediate steps you can take toward NAC now and explore alternative best-of-breed approaches. It also examines how to simplify your security architecture with all-in-one and integrated products that offer heightened levels of traffic control and looks at new technologies that consolidate network and security management for optimum network/security traffic analysis.

Read about:

  • Network access control
  • Endpoint security
  • SSL VPNs
  • Application firewalls
  • Unified threat management
  • Security-enabled network hardware
  • Monitoring controls for network security and performance

Download the chapter now

This was first published in July 2008

Join the conversationComment

Share
Comments

    Results

    Contribute to the conversation

    All fields are required. Comments will appear at the bottom of the article.