Identity-based NAC: Using Identity to Put the “Control” in Network Access Control

  • Source: M.I.S.T
  • Written By:
  • Published:
  • (Originally Published On:) )
Access control is more than just checking devices for malware before admitting them to a network. Identity-based network access control (NAC) looks at the identities of users and devices, and knows what resource they are authorized to access, allowing enterprises to tightly control access, and the devices and behavior of users.

Featured Software Research:

VoIP Introduction

VoIP uses internet protocol data packets to transfer voice, fax, and other data over the shared network, rather than the traditional public switched telephone network (PSTN), which is based on copper wires carrying analog voice data over the dedicated circuits. VoIP, in contrast to PSTN, uses what is called packet-switched telephony, whereby the voice information travels to its destination in individual network packets across the Internet that are assembled and then converted to voice. Learn the... Read More

Selecting ERP for Engineer-to-order Manufacturing

  • Source: IFS
  • Written By:
  • Published:
Most enterprise resource planning (ERP) software was not designed for a project-oriented environment like engineer-to-order (ETO). How do the needs of ETO manufacturers differ from more traditional manufacturers? And how can an ETO manufacturer go about selecting ERP software that truly meets their needs for project visibility and control? Download this white paper to find out more. Read More

You may also be interested in these related documents:

Evolve Your SiteMinder Portal Security Without Breaking the Bank: How Virtualization Solves the Challenges of Heterogeneous Identity and Resource Integration

In a well integrated identity environment, SiteMinder handles web access management, authentication, single sign-on (SSO), secure session management, and flexible policy definition. SiteMinder functions well when data exists in a relatively homogeneous state; this blueprint shows users how to extend an existing SiteMinder infrastructure across additional heterogeneous applications, identity sources, and constituents. Read More

How Midsize Businesses Can Reduce Costs, Secure Data, and Ensure Compliance with an Identity Management Program

A strong identity management platform plays dual roles: gatekeeper and guardian of business intelligence (BI) and data. Midsize businesses can’t operate effectively without the ability to control access to their networks and business systems. And, many midsize companies must report on this information for compliance purposes. Learn about the factors driving midsize companies toward stronger identity management systems. Read More

Identity-based Policy Enforcement: A LAN Security Best Practices Whitepaper

Disappearing network perimeters highlight the need for identity-based security. Open networks, mobile systems, and unmanaged endpoints have become overwhelming obstacles—and cash drains. However, enforced identity-based policies within identity-blind systems have proven futile. Is there a solution? Yes. Make your policy enforcement layer identity-aware—build user identity knowledge directly into your network fabric. Read More
 
comments powered by Disqus