Email Alerts
-
NAC and endpoint security frameworks: Which way to go?
We've all heard about the Cisco and Microsoft initiatives for NAC, plus the standards-based Trusted Network Connect. What's the difference between these approaches and which, if any, should you choose to secure your endpoints and keep your local netw... Article | 07 Nov 2006
-
Network access control: Should you implement now?
Implementing network access control (NAC) is a big step, and deciding whether and when to start is daunting. Networking experts say the sooner the better, but before going into NAC full throttle, enterprises must first determine their motivation. Article | 03 Nov 2006
-
Defending an expansive definition of NAC
There is a good bit of controversy about what constitutes a complete NAC solution. Broadening our definition and expectations will enable networking pros to tightly integrate NAC into the IT infrastructure and leverage it as a true access control sys... Article | 26 Oct 2006
-
Video, audio are network drains
Network misuse is rampant, according to a recent survey. Employees using the corporate network for recreation or high-bandwidth business can put a strain on network resources, but network engineers can combat that with filtering and monitoring. Article | 25 Oct 2006
-
Data leakage protection: Where does it fit in the network?
Network-based antivirus and antispam products are getting a face-lift with next-generation content filtering, but is data leakage protection best served in the network or at the endpoint? Article | 18 Oct 2006
-
Users anticipate joint Cisco and Microsoft security
Users are keen on checking out Microsoft and Cisco's interoperable security architecture outlined this week by both companies. When it comes to enterprise security, however, Cisco still gets more respect from IT shops. Article | 11 Sep 2006
-
Data-leakage security threat to meet its protection match
Security-aware network managers fretting over headlines about intellectual property loss may find hope in the emerging data-leakage protection industry. Article | 29 Aug 2006
-
Microsoft and Cisco ready to demo NAP/NAC
There is harmony at last between two high-tech elephants. At a Boston security conference, Microsoft and Cisco will demonstrate how their competing security technologies will co-exist. Article | 24 Aug 2006
-
Possible Cisco zero-day exploit revealed at Black Hat
Details of an alleged flaw related to SIP and PIX appliances, briefly mentioned in a Wednesday Black Hat presentation, are being kept under wraps as Cisco and US-CERT investigate. Article | 08 Aug 2006
-
Cisco security flaw under scrutiny
Cisco continues to investigate a potential PIX firewall flaw, but it and other vendors say sharing security information quickly and indiscriminately is always the best policy. Article | 04 Aug 2006
Network Management Strategies for the CIO