Despite the fact that network access control hasn’t yet lived up to its initial promise, NAC is very much alive, as evidenced by the fact that 12 vendors participated in our NAC test, including ...
In the NAC products we tested, authentication varies from very strong to very weak, and every point in-between. When starting down your path of evaluating NAC products, decide very early what kind of ...
Have you ever heard of ACLs? This is very important where computer security is concerned. In this article, we will discuss what ACLs are, along with the types of ACLs available right now. What is ...
From PDAs and laptops to insecure wireless modems, Windows users have options for connecting to and infecting networks. Created in partnership with our sister site SearchSecurity.com, this network ...
Microsoft and the Trusted Computing Group (TCG) have joined forces to create better interoperability between network access control solutions with the announcement of a new specification which ensures ...
The network is a critical component in the day-to-day operations of any company. As a company becomes more dependent on its network for its most important operations, the IT department must spend more ...
That's the message from a Forrester report on the subject. Titled 'Network Access Control Predictions: 2011 And Beyond', the study says that, despite this low percentile, a good third of companies are ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results