Identity-based NAC: Using Identity to Put the “Control” in Network Access Control

  • Source: M.I.S.T
  • Written By:
  • Published:
  • (Originally Published On:) )
Access control is more than just checking devices for malware before admitting them to a network. Identity-based network access control (NAC) looks at the identities of users and devices, and knows what resource they are authorized to access, allowing enterprises to tightly control access, and the devices and behavior of users.

Featured Software Research:

11 Criteria for Selecting the Best ERP System Replacement

An enterprise resource planning (ERP) system is your information backbone, reaching into all areas of your business and value chain. That’s why replacing it can open unlimited business opportunities. The cornerstone of this effort is finding the right partner. And since your long-term business strategy will shape your selection, it’s critical that your ERP provider be part of your vision. Read More

5 Signs It’s Time to Gain Control of Your Spend

Indirect spend—the cost of goods and services that are not directly incorporated into your product—is a blind spot for most companies. And the more quickly you grow, the faster indirect spend gets out of hand—and the more it affects your company’s bottom line. How do you know when to upgrade your spend management system and gain control of your spend? Here are five signs that the time is now. Read More

You may also be interested in these related documents:

Evolve Your SiteMinder Portal Security Without Breaking the Bank: How Virtualization Solves the Challenges of Heterogeneous Identity and Resource Integration

In a well integrated identity environment, SiteMinder handles web access management, authentication, single sign-on (SSO), secure session management, and flexible policy definition. SiteMinder functions well when data exists in a relatively homogeneous state; this blueprint shows users how to extend an existing SiteMinder infrastructure across additional heterogeneous applications, identity sources, and constituents. Read More

How Midsize Businesses Can Reduce Costs, Secure Data, and Ensure Compliance with an Identity Management Program

A strong identity management platform plays dual roles: gatekeeper and guardian of business intelligence (BI) and data. Midsize businesses can’t operate effectively without the ability to control access to their networks and business systems. And, many midsize companies must report on this information for compliance purposes. Learn about the factors driving midsize companies toward stronger identity management systems. Read More

Identity-based Policy Enforcement: A LAN Security Best Practices Whitepaper

Disappearing network perimeters highlight the need for identity-based security. Open networks, mobile systems, and unmanaged endpoints have become overwhelming obstacles—and cash drains. However, enforced identity-based policies within identity-blind systems have proven futile. Is there a solution? Yes. Make your policy enforcement layer identity-aware—build user identity knowledge directly into your network fabric. Read More
 
comments powered by Disqus