Securing Visitor Access through Network Access Control Technology

  • Source: ForeScout
  • Written By:
  • Published:
  • (Originally Published On:) )
The network infrastructure in today’s enterprises faces incredible challenges as both business processes and workforce requirements evolve. Furthermore, large public enterprises are hosting exponentially higher numbers of financial auditors due to US federal regulations, especially Sarbanes-Oxley. This has caused a heightened need to ensure that the network remains safe, while still permitting auditors and their unknown devices to remain productive.

Featured Software Research:

The Need to Rethink the WAN

Technological advances have evolved at an exponential rate over recent decades—we’ve seen the advent of the Internet, cloud computing, virtualization, and several other technologies. But the wide area network (WAN) technologies that are currently in use in most branch offices have changed little since the 1990s.

Business environments today are experiencing unprecedented growth and change, and IT departments are losing visibility and control. Traditional WAN technologies are a mismatch for modern branch networks that need to be up and running quickly. The demand for adaptability, awareness of costs, and the need to run and monitor business-critical processes are indicating the necessity for a new WAN technology paradigm.

New WAN services based on the latest technologies have not been deployed by traditional service providers, primarily because they require an initial financial outlay which companies are not prepared to make. But they are poised to succeed multiprotocol label switching (MPLS), and are the most viable alternative for supporting application performance while dealing with increased network traffic and the connectivity demands of cloud computing and mobile access.

In this white paper, the characteristics of WAN technology and the limitations of traditional WAN technology, including complexity, are explored. This paper also discusses some new approaches, such as a hybrid WAN, which are better suited to supporting fast-changing business and technology environments.  Read More

The Guide to Google Apps Training: Part Two: How to Secure a Google Apps Domain

You don’t have control over attempted attacks on your domain, but putting the right security systems in place means you can block access to your data and your domain. Google Apps provides users with a wide variety of customizable options to ensure that a domain is secure. Google Apps features stringent user access controls, governing how and when selected users gain access to the domain, and a disaster recovery system in order to retrieve any data compromised due to a security breach.

In this white paper, learn the basic systems and settings for a variety of security features, including development of domain recovery options, enforcement of secure sockets layer (SSL) connections, how to configure two-factor authorization for maximum mobile security, and the importance of auditing and setting long minimums for passwords. You’ll also read how the Google Apps system works to create the best mobile security for your domain, and how installation of a Google Apps Device Policy can further protect your domain in case of device theft. Get information on the disaster recovery features included in the core Google Apps, and how third-party systems such as Backupify can be added to further strengthen data recovery options, ensuring that duplicate copies of documents are available. Through these controls, users can be assured that their domain data is secure.  Read More

A Day in the Life of the Mobile Worker

  • Source: Pulse Secure
  • Written By:
  • Published:
Working remotely, on mobile devices, and in a bring-your-own-device (BYOD) environment means that in a typical day, employees require secure mobile access to all kinds of networks and information. This document outlines the mobility approach of Pulse Secure—a provider of access and mobile security solutions. The company looks at some typical daily processes a mobile worker will encounter, including working from home, checking e-mail while traveling, and accessing a corporate network from a personal device. Read More

You may also be interested in these related documents:

Access Management: Efficiency, Confidence and Control

Managing access to protected resources can be risky business as new applications and services are deployed, as new users join the extended enterprise, or as existing users change roles. Strategy and technology choices—along with the policy, planning, process, and organizational elements of implementation—are critical factors in the overall success of an organization’s access management initiative. Read More

Choosing a Network Access Control (NAC) Solution that Is Right for Your Network

Over the last two years, there has been a significant amount of IT industry attention focused on controlling users and devices access¬ing the corporate network. In this same time, the number of mobile com¬puting devices has surpassed the number of desktops used in corporate networks. Needless to say, the challenge IT managers face in securing the network has grown exponentially. Read More

Identity-based NAC: Using Identity to Put the “Control” in Network Access Control

Access control is more than just checking devices for malware before admitting them to a network. Identity-based network access control (NAC) looks at the identities of users and devices, and knows what resource they are authorized to access, allowing enterprises to tightly control access, and the devices and behavior of users. Read More
 
comments powered by Disqus