Identity-based NAC: Using Identity to Put the “Control” in Network Access Control

  • Source: M.I.S.T
  • Written By:
  • Published:
  • (Originally Published On:) )
Access control is more than just checking devices for malware before admitting them to a network. Identity-based network access control (NAC) looks at the identities of users and devices, and knows what resource they are authorized to access, allowing enterprises to tightly control access, and the devices and behavior of users.

Featured Software Research:

11 Criteria for Selecting the Best ERP System Replacement

An enterprise resource planning (ERP) system is your information backbone, reaching into all areas of your business and value chain. That’s why replacing it can open unlimited business opportunities. The cornerstone of this effort is finding the right partner. And since your long-term business strategy will shape your selection, it’s critical that your ERP provider be part of your vision. Read More

State of Fraud Today: Using Proactive, Real-Time Interactive Notifications to Fight Fraud and Increase Customer Loyalty

With identity theft and consumer fraud on the rise, and more frequent and sizable data breaches in the news, financial institutions need to be taking a multi-channel approach to fighting fraud, to both reduce fraud losses and maintain customer loyalty and satisfaction.

This approach should include proactive financial alerts, to quickly give customers the necessary information and the tools to help combat fraud. Mobile plays a critical role as it provides the ability to reach customers... Read More

You may also be interested in these related documents:

Evolve Your SiteMinder Portal Security Without Breaking the Bank: How Virtualization Solves the Challenges of Heterogeneous Identity and Resource Integration

In a well integrated identity environment, SiteMinder handles web access management, authentication, single sign-on (SSO), secure session management, and flexible policy definition. SiteMinder functions well when data exists in a relatively homogeneous state; this blueprint shows users how to extend an existing SiteMinder infrastructure across additional heterogeneous applications, identity sources, and constituents. Read More

How Midsize Businesses Can Reduce Costs, Secure Data, and Ensure Compliance with an Identity Management Program

A strong identity management platform plays dual roles: gatekeeper and guardian of business intelligence (BI) and data. Midsize businesses can’t operate effectively without the ability to control access to their networks and business systems. And, many midsize companies must report on this information for compliance purposes. Learn about the factors driving midsize companies toward stronger identity management systems. Read More

Identity-based Policy Enforcement: A LAN Security Best Practices Whitepaper

Disappearing network perimeters highlight the need for identity-based security. Open networks, mobile systems, and unmanaged endpoints have become overwhelming obstacles—and cash drains. However, enforced identity-based policies within identity-blind systems have proven futile. Is there a solution? Yes. Make your policy enforcement layer identity-aware—build user identity knowledge directly into your network fabric. Read More
 
comments powered by Disqus