Securing Visitor Access through Network Access Control Technology

  • Source: ForeScout
  • Written By:
  • Published:
  • (Originally Published On:) )
The network infrastructure in today’s enterprises faces incredible challenges as both business processes and workforce requirements evolve. Furthermore, large public enterprises are hosting exponentially higher numbers of financial auditors due to US federal regulations, especially Sarbanes-Oxley. This has caused a heightened need to ensure that the network remains safe, while still permitting auditors and their unknown devices to remain productive.

Featured Software Research:

The Need to Rethink the WAN

Technological advances have evolved at an exponential rate over recent decades—we’ve seen the advent of the Internet, cloud computing, virtualization, and several other technologies. But the wide area network (WAN) technologies that are currently in use in most branch offices have changed little since the 1990s.

Business environments today are experiencing unprecedented growth and change, and IT departments are losing visibility and control. Traditional WAN technologies are a mismatch for... Read More

Securing Edge Data at the Center

  • Source: IDC
  • Written By:
  • Published:
Even as enterprises focus relentlessly on consolidation of data centers, they continue to aggressively expand the roles and numbers of branch offices, often located in remote locations that are difficult to support and protect. That poses the issue of how to protect data on the edge of the network, which may be subject to a variety of risks. Data centers are built to secure systems and data, and to help ensure business continuity and recovery after interruptions and disasters. Remote offices, on... Read More

Case Study: FM Logistic

The information technology (IT) infrastructure of international logistics provider FM Logistic had grown over time resulting in poor application performance. The company wanted to speed up access to critical enterprise applications and centralize e-mail without negatively impacting employee productivity. FM Logistic installed 71 Riverbed Steelhead appliances in 13 countries, together with its Cascade solution to improve application performance, and application and network visibility. The company... Read More

You may also be interested in these related documents:

Access Management: Efficiency, Confidence and Control

Managing access to protected resources can be risky business as new applications and services are deployed, as new users join the extended enterprise, or as existing users change roles. Strategy and technology choices—along with the policy, planning, process, and organizational elements of implementation—are critical factors in the overall success of an organization’s access management initiative. Read More

Choosing a Network Access Control (NAC) Solution that Is Right for Your Network

Over the last two years, there has been a significant amount of IT industry attention focused on controlling users and devices access¬ing the corporate network. In this same time, the number of mobile com¬puting devices has surpassed the number of desktops used in corporate networks. Needless to say, the challenge IT managers face in securing the network has grown exponentially. Read More

Identity-based NAC: Using Identity to Put the “Control” in Network Access Control

Access control is more than just checking devices for malware before admitting them to a network. Identity-based network access control (NAC) looks at the identities of users and devices, and knows what resource they are authorized to access, allowing enterprises to tightly control access, and the devices and behavior of users. Read More
 
comments powered by Disqus