Tuesday, January 20, 2009

Must-dos for evaluating NAC gear

Some must-dos for NAC comparison testing
Network World logo

Security: Network Access Control Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by AMD
rule

See the power of the new Quad-Core AMD Opteron(TM) processor.
Virtualization is a proven engine that drives business performance. The fusion of the Quad-Core AMD Opteron(TM) processor and virtualization - It's a match made in the data center. Find out more:

rule

Spotlight Story
Must-dos for evaluating NAC gear

Tim Greene By Tim Greene
Anyone deploying NAC needs to test the products they are considering, and here are a few must-do tests for comparison. Read full story

Tim Greene is senior editor at Network World.

Related News:

Considering NAC's expanded uses Those considering NAC and even those who have already bought it might want to consider expanding its use, according to a recent Gartner report.

Software agents as management tools for NAC The argument goes you can never control network access for a desktop with a software agent because agents can be hacked, and there is no way to know for certain whether one has been compromised.

Enforcing regulatory compliance standards with NAC NAC is often used as one tool for enforcing regulatory compliance standards and then proving that the standards were met.

SonicWall airs zippy security appliance for small businesses SonicWall is introducing a multi-function security appliance for small businesses that gives five times more throughput than its low-end devices for an extra $200.

Microsoft promises integrated, identity-aware security platform In an interview with John “JG” Chirapurath, director of marketing for the Identity & Security (I&S) unit at Microsoft, he discussed Identity Lifecycle Manager 2; Forefront (Stirling); Intelligent Application Gateway SP2 and Microsoft's vision for a comprehensive, identity aware platform.

Secure Software: 'See No Evil' is Not a Strategy It has been written that data is the new gold, the new oil, the new currency, and even the new crown jewels. It has become very popular to write about, and to capitalize upon, data as the new medium through which commerce is done. Unfortunately, while gold is typically transported in high security vehicles between highly secured facilities, and while no expense is spared in protecting national money supplies from theft and forgery, data is not managed this way, it is handled by software. This is software written twenty years ago for mainframes in sealed rooms, or software written by brilliant but unseen open source programmers to provide low-cost high-grade functionality, or software written by individuals with little formal secure programming training, looking to improve user experience and corporate profitability. Every major organization, enterprise, and government in the world relies on software, and there is virtually no consensus on what it means to have secure software, how to

January giveaways from Cisco Subnet and Microsoft Subnet
Up for grabs: Two Cisco training courses from Skyline-ATS worth up to $6,990, a Microsoft training course from New Horizons worth up to $2,500, 15 copies each of the hot book titles Microsoft SQL Server 2008 Management and Administration, IPv6 Security and Chained Exploits: Advanced Hacking Attacks. Get all the entry details here.


IT Outlook '09
Products of the WeekIn-depth analysis of the latest enterprise strategies, start-ups to watch, people to know, and more.

9 hot technologies for '09
9 hot technologies for '09Our annual rundown, plus a tip or two about how to approach each hot technology.

Sponsored by AMD
rule

See the power of the new Quad-Core AMD Opteron(TM) processor.
Virtualization is a proven engine that drives business performance. The fusion of the Quad-Core AMD Opteron(TM) processor and virtualization - It's a match made in the data center. Find out more:

rule

Take Control of Network TCO by Automating IPAM
Join ESG and Infoblox to learn about reducing network TCO while boosting network availability by automating IPAM.
Review this information-packed webinar today.


Successfully Manage a Secure Database.
Database professionals are invited to join this Oracle Live Webcast on Thursday, February 5 at 2:00 p.m. ET/11:00 a.m. PT. Gain a better understanding of database security and how to more strategically work with security administrators. Don't miss out.
Register for this live webcast now.

 

01/20/09

Today's most-read stories:

  1. Microsoft layoffs could come next week
  2. U.S. plots major upgrade to Internet router security
  3. Nortel's bankruptcy: A long time coming
  4. FAQ: What's in store for Nortel
  5. The presidential portrait goes digital
  6. Why Windows 7 will crush Linux
  7. Worm infects 1.1M Windows PCs in 24 hours
  8. Microsoft/Nortel relationship again under microscope
  9. Windows 7 on Netbooks: Does Linux stand a chance?
  10. How Obama might get his way on BlackBerry


Preparing for the Next Cyber Attack.
Ensure you are up-to-speed on the latest security technologies available to keep your network safe in this Executive Guide. Get a thorough assessment of the corporate security threat landscape. Protect your network with data leakage protection, NAC and other technologies explained in this report.
Download this Executive Guide now.



IT Buyers guide

 


This email was sent to networking.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: