Network Access Control (NAC): CounterACT

  • Source: ForeScout
  • Written By:
  • Published:
  • (Originally Published On:) )
The number of devices in the corporate world is increasing every year. And as mobility proliferates, so does the requirement for network security solutions to protect against external attacks, as well as attacks originating inside the network perimeter. However, network access control solutions can provide organizations with the ability to automatically enforce security policies, while still maintaining user productivity.

Featured Software Research:

The Need to Rethink the WAN

Technological advances have evolved at an exponential rate over recent decades—we’ve seen the advent of the Internet, cloud computing, virtualization, and several other technologies. But the wide area network (WAN) technologies that are currently in use in most branch offices have changed little since the 1990s.

Business environments today are experiencing unprecedented growth and change, and IT departments are losing visibility and control. Traditional WAN technologies are a mismatch for... Read More

A Day in the Life of the Mobile Worker

  • Source: Pulse Secure
  • Written By:
  • Published:
Working remotely, on mobile devices, and in a bring-your-own-device (BYOD) environment means that in a typical day, employees require secure mobile access to all kinds of networks and information. This document outlines the mobility approach of Pulse Secure—a provider of access and mobile security solutions. The company looks at some typical daily processes a mobile worker will encounter, including working from home, checking e-mail while traveling, and accessing a corporate network from a personal... Read More

A Day in the Life of the Mobile Worker

  • Source: Pulse Secure
  • Written By:
  • Published:
Working remotely, on mobile devices, and in a bring-your-own-device (BYOD) environment means that in a typical day, employees require secure mobile access to all kinds of networks and information. This document outlines the mobility approach of Pulse Secure—a provider of access and mobile security solutions. The company looks at some typical daily processes a mobile worker will encounter, including working from home, checking e-mail while traveling, and accessing a corporate network from a personal... Read More

You may also be interested in these related documents:

Choosing a Network Access Control (NAC) Solution that Is Right for Your Network

Over the last two years, there has been a significant amount of IT industry attention focused on controlling users and devices access¬ing the corporate network. In this same time, the number of mobile com¬puting devices has surpassed the number of desktops used in corporate networks. Needless to say, the challenge IT managers face in securing the network has grown exponentially. Read More

Network Access Control (NAC): Planning a Successful Rollout and Implementation

With the emergence of network access control (NAC) technologies, network administrators now have tools to gain critical network understanding. NAC solutions can contribute significantly to an organization’s business objectives by automatically enforcing network and security policies, preventing network downtimes, maintaining network integrity, and meeting compliance regulations. With this in mind, it’s important to look at what NAC implementations actually require. Read More

Identity-based NAC: Using Identity to Put the “Control” in Network Access Control

Access control is more than just checking devices for malware before admitting them to a network. Identity-based network access control (NAC) looks at the identities of users and devices, and knows what resource they are authorized to access, allowing enterprises to tightly control access, and the devices and behavior of users. Read More
 
comments powered by Disqus