Home
 > Research and Reports > White Papers > Identity-based NAC: Using Identity to Put the “Contro...

Identity-based NAC: Using Identity to Put the “Control” in Network Access Control

Source: Caymas Systems
Access control is more than just checking devices for malware before admitting them to a network. Identity-based network access control (NAC) looks at the identities of users and devices, and knows what resource they are authorized to access, allowing enterprises to tightly control access, and the devices and behavior of users.


Featured publications:

IQMS Continues to Extend EnterpriseIQ ERP Footprint
Written By: Ted Rohm Published On: April 16 2014 IQMS recently announced the release of a number of new large modules and some 550 functional enhancements to its flagship solution EnterpriseIQ. The most recent module added to EnterpriseIQ is the WebDirect B2C portal. The WebDirect B2C storefront lets consumers browse products, make product purchases, and monitor order status and history directly on a manufacturer’s Web site. Read More...
Vitatech Enhances Quality Control with QAD ERP Upgrade
Published On: April 16 2014 Vitatech Nutritional Sciences Inc., a vitamin and supplement formulation company, recently implemented the new quality capabilities in QAD Enterprise Applications. The enhanced QAD quality control framework allows Vitatech to track and report on ingredients used in different lots, batches, and stages of its manufacturing processes. Read More...
Infor Ships Infor SCE v10.3
Written By: Predrag Jakovljevic Published On: April 17 2014 Infor recently announced Infor Supply Chain Execution (SCE) version 10.3, with new functionality and capabilities for logistics and warehouse management. Find out how these enhancements can help your organization achieve dynamic supply chain execution. Read More...


You may also be interested in these related documents:

How Midsize Businesses Can Reduce Costs, Secure Data, and Ensure Compliance with an Identity Management Program
Source: Oracle A strong identity management platform plays dual roles: gatekeeper and guardian of business intelligence (BI) and data. Midsize businesses can’t operate effectively without the ability to control access to their networks and business systems. And, many midsize companies must report on this information for compliance purposes. Learn about the factors driving midsize companies toward stronger identity management systems. Read More...
Network Access Control (NAC): CounterACT
Source: ForeScout The number of devices in the corporate world is increasing every year. And as mobility proliferates, so does the requirement for network security solutions to protect against external attacks, as well as attacks originating inside the network perimeter. However, network access control solutions can provide organizations with the ability to automatically enforce security policies, while still maintaining user productivity. Read More...
Identity-based NAC and PCI Data Security Compliance
Source: Caymas Systems As of June 2006, the payment card industry (PCI) has established a detailed set of policy, procedure, infrastructure, and data security requirements for merchants that store and process credit card data. That’s why it’s vital for key PCI requirements to be met when it comes to encryption, user authentication, virus and malware control, access control, and auditing. Read More...

 
comments powered by Disqus



Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others

©2014 Technology Evaluation Centers Inc. All rights reserved.