Five do's and don'ts for securing your network

February 02, 2009 Published by  SearchCIO-Midmarket.com

Weekly Tech Advice

SearchCIO-Midmarket.com
Network access control: Pointers for getting the knack of NAC
Linda Tucci, Senior News Writer

Network access control (NAC) first got the attention of security pros in the wake of the Blaster worm in 2003. Here was a technology that checked student machines at the network gate and kept the sick and dangerous at bay. As one academic we interviewed gushed, who wouldn't want NAC on their network?

Six years later, still lacking a single standard and proving more difficult to implement than it first appeared, network access control is nonetheless being hailed as a valuable, if not critical, security technology. Indeed, Forrester Research Inc. is predicting a blockbuster year for NAC, claiming in a recent report that this watchdog technology is fast becoming "a critical component in making many security initiatives efficient and a seamless part of the network infrastructure." Gartner Inc. research director Lawrence Orans calls NAC "a valuable defense that you can add to your network," adding "our advice is start doing NAC now."

The technology has moved beyond simply checking and isolating an endpoint device that doesn't have up-to-date security protection to compliance, according to Forrester analyst Robert Whiteley. Now companies are using NAC to check endpoints continually for anomalous behavior and even to monitor employees' roles and rights to network access. NAC can shine a light on stuff you never knew or long forgot belonged to you, thus also helping with asset management.
READ FULL STORY


  ADVERTISEMENT  
Click here to find out more!
Get answers to all your CIO questions on ITKnowledgeExchange.com
 

ABOUT THIS E-NEWSLETTER
TechTarget This e-newsletter is published by SearchCIO-Midmarket.com, a targeted Web site from TechTarget, The IT Media ROI Experts and events company.
Copyright 2009 TechTarget. All rights reserved.

If you no longer wish to receive Weekly Tech Advice from SearchCIO-Midmarket.com go to unsubscribe: http://searchCIO-Midmarket.techtarget.com/u?track=NL-974&em=sekhargreen%40gmail.com&uid=4946246&eid=687113&

Please note, unsubscribe requests may take up to 24 hours to process; you may receive additional mailings during that time. A confirmation e-mail will be sent when your request has been successfully processed.

Contact Us:
SearchCIO-Midmarket.com
Member Services
117 Kendrick Street, Suite 800
Needham, MA 02494