Identity-based NAC: Using Identity to Put the “Control” in Network Access Control

  • Source: M.I.S.T
  • Written By:
  • Published:
  • (Originally Published On:) )
Access control is more than just checking devices for malware before admitting them to a network. Identity-based network access control (NAC) looks at the identities of users and devices, and knows what resource they are authorized to access, allowing enterprises to tightly control access, and the devices and behavior of users.

Featured Software Research:

11 Criteria for Selecting the Best ERP System Replacement

An enterprise resource planning (ERP) system is your information backbone, reaching into all areas of your business and value chain. That’s why replacing it can open unlimited business opportunities. The cornerstone of this effort is finding the right partner. And since your long-term business strategy will shape your selection, it’s critical that your ERP provider be part of your vision. Read More

The Need to Rethink the WAN

Technological advances have evolved at an exponential rate over recent decades—we’ve seen the advent of the Internet, cloud computing, virtualization, and several other technologies. But the wide area network (WAN) technologies that are currently in use in most branch offices have changed little since the 1990s.

Business environments today are experiencing unprecedented growth and change, and IT departments are losing visibility and control. Traditional WAN technologies are a mismatch for... Read More

State of Fraud Today: Using Proactive, Real-Time Interactive Notifications to Fight Fraud and Increase Customer Loyalty

With identity theft and consumer fraud on the rise, and more frequent and sizable data breaches in the news, financial institutions need to be taking a multi-channel approach to fighting fraud, to both reduce fraud losses and maintain customer loyalty and satisfaction.

This approach should include proactive financial alerts, to quickly give customers the necessary information and the tools to help combat fraud. Mobile plays a critical role as it provides the ability to reach customers... Read More

You may also be interested in these related documents:

How Midsize Businesses Can Reduce Costs, Secure Data, and Ensure Compliance with an Identity Management Program

A strong identity management platform plays dual roles: gatekeeper and guardian of business intelligence (BI) and data. Midsize businesses can’t operate effectively without the ability to control access to their networks and business systems. And, many midsize companies must report on this information for compliance purposes. Learn about the factors driving midsize companies toward stronger identity management systems. Read More

Network Access Control (NAC): CounterACT

The number of devices in the corporate world is increasing every year. And as mobility proliferates, so does the requirement for network security solutions to protect against external attacks, as well as attacks originating inside the network perimeter. However, network access control solutions can provide organizations with the ability to automatically enforce security policies, while still maintaining user productivity. Read More

Identity-based NAC and PCI Data Security Compliance

As of June 2006, the payment card industry (PCI) has established a detailed set of policy, procedure, infrastructure, and data security requirements for merchants that store and process credit card data. That’s why it’s vital for key PCI requirements to be met when it comes to encryption, user authentication, virus and malware control, access control, and auditing. Read More
 
comments powered by Disqus