Email Alerts
-
Network access control: A hybrid approach
In our second case study on NAC, an organization deploys a hybrid in-line and out-of-band NAC solution from Cisco Systems Inc. Article
-
Appliance-based network access control keeps university network secure
This NAC system enforces security policy for 25,000-plus students, faculty and staff, replacing a sneakernet form of worm control. Article
-
Poor data-loss prevention practices almost cost Intel a billion
While Intel's network security logged meticulous employee access data, red flags weren't raised to stop one potential thief until he had made off with the data. Article
-
Network access control poised for a comeback by aiming small
Network access control (NAC) vendors could make good on their faded hype by offering customers specific solutions to major pain points, such as guest network access control and identity-based access. Article
-
Dynamic network access control secures electronics manufacturer
Pioneer Electronics is using dynamic network access control (NAC) technology from ConSentry to secure its networks. Article
-
Shifting defenses and dynamic perimeters challenge network security
Network security faces challenges from de-perimeterization and other IT trends. Fine-grained controls are needed closer to information resources and will increasingly be built into both simple and complex systems. Tip
-
Multi-service gateways booming for small businesses and branch offices
Multi-service business gateways (MSBGs) can ease remote IT management tasks and help small and medium businesses (SMBs) shave costs. Article
-
Compliance in a virtualized world: Server virtualization and NAC security
Network security, especially NAC, is the Achilles' heel of server virtualization. With virtual servers moving around the data center, traditional access control is difficult to apply. This can be particularly challenging when organizations need to me... Tip
-
Securing the new network architecture: Security for distributed, dynamic networks
In years past, companies relied on network edge security to establish a perimeter separating trusted insiders from everyone else. However, the distributed and dynamic nature of modern networks, combined with targeted threats against applications and ... Tip
-
What is data loss prevention? -- An introduction to DLP
Most network security products focus on keeping the bad guys -- Trojans, viruses and hackers -- outside of the network, but data loss prevention (DLP) keeps the good stuff -- sensitive enterprise data -- in. With more business data leaks tainting the... Interview
Network Management Strategies for the CIO