Search This Blog

Tuesday, June 22, 2010

Ultimate guide to network access control products

  Network access control vendors pass endpoint security testing | Network access control management: Pick your poison
 
  Network World Security

Forward this to a Friend >>>


Ultimate guide to network access control products
Despite the fact that network access control hasn't yet lived up to its initial promise, network access control is very much alive, as evidenced by the fact that 12 vendors participated in our network access control test, including industry leaders Microsoft, HP, Juniper, McAfee, Symantec and Alcatel-Lucent. Read More


WHITE PAPER: Cisco Ironport Systems

Learn the 3 Best Practices for Securing E-mail
Any IT manager will tell you it's critical to protect data. With information flowing freely today via mobile devices, collaboration technologies and unified communications, it isn't easy. Learn data leak prevention (DLP) triage and the steps to protect proprietary data in e-mail, while also complying with government and industry regulations. Read now!

WHITE PAPER: Hitachi Data Systems

Optimizing HA and DR in Microsoft® Virtualized Environments
This white paper discusses how organizations can leverage the joint Microsoft and Hitachi solution to create a cost effective, highly available and remotely replicated virtual server infrastructure. Read Now

Network access control vendors pass endpoint security testing
One of the main promises of NAC is that you can ensure that endpoint security tools are up to date and that non-compliant machines can be identified or blocked. As regulatory compliance has grown in importance, NAC vendors have reacted by building strong feature sets aimed at endpoint security and compliance. In our NAC testing, we had good, and sometimes great, results across the board when it came to endpoint security. Read More

Network access control management: Pick your poison
In testing 12 NAC products, we discovered an incredible variety of management styles. To organize our results, we broke things up into three main categories: overall management, separation of control, and high availability. Read More

Cisco NAC: Strong in-line enforcement
While Cisco's overall NAC strategy is in flux, a NAC Appliance investment is likely to come with substantial purchase protection — just be sure to keep your SMARTnet contract up to date. Read More

Juniper NAC: Powerful, complex
Trying to describe Juniper's UAC is difficult, because Juniper's NAC strategy has its tendrils in virtually every security product the company makes, from firewalls to switches to SSL VPNs. Read More


RESOURCE COMPLIMENTS OF: AT&T

AT&T
Designing Tomorrow's Ethernet-Based Metropolitan Area Networks Click to continue

McAfee NAC focuses on endpoint protection
McAfee NAC is clearly slanted towards endpoint security and compliance requirements more than fine-grained network access controls. Because McAfee NAC depends heavily on ePolicy Orchestrator, existing McAfee end-point security customers will find that adding McAfee's NAC to their networks is a very natural and easy extension. Read More

Enterasys NAC: Put it on your short list
Enterasys has done a good job making sure that its NAC product works very well in non-Enterasys networks. Because Enterasys NAC has both in-line and edge-enforcement technologies in a single product line, we think that this is a definite short-list for any 802.1X-based NAC deployment. Read More

ForeScout focuses on network visibility
ForeScout's CounterACT has a very different take on NAC; the closest competitor is really Trustwave. In CounterACT's framework, the appliance scans network traffic to classify devices as they join the network. Read More

Supreme Court Sides with Employers in Narrow Ruling
Six months after agreeing to consider a case regarding employee privacy rights in the workplace, the United States Supreme Court has ruled. Unfortunately for the Ontario police officers involved in the controversial case, and former Detroit mayor Kwame Kilpatrick, the Supreme Court found that employers have a right to employ reasonable monitoring efforts on state-issued devices. Read More


WHITE PAPER: Aerohive

Deploying a Secure WLAN
This paper walks through the steps to build a highly-secure wireless LAN and explains the technical considerations for: • Wireless privacy • Authentication • Client management and NAC • Network firewall and intrusion detection and protection • Identity-based access control • Rogue detection and WIDS • Compliance Read more!

Spies, WikiLeaks, and hackers, oh my!
It's like a Hollywood thriller. A military spy is arrested, betrayed by someone he thought to be a comrade in arms -- a brilliant yet mentally disabled hacker. A journalist is on the run, hunted by the authorities who want to know what he knows. All it needs is a love interest and Matt Damon, and I think we can get this greenlit. (When I get through with this blog post I'm going to have my agent call Spielberg and set up a lunch.) Read More

Avenda offers full-featured network access control
At its core, Avenda's eTIPS is a RADIUS server specifically designed for NAC authentication and access controls. Avenda gives authentication, endpoint security checking, and policy enforcement equal weight, making eTIPS a very well balanced NAC product. Read More

Alcatel-Lucent/InfoExpress combo needs better integration
Together, the two vendors offer a complete framework and a wide set of hardware options. The result is interoperable parts that network managers can combine to give different types of NAC enforcement in different network topologies. Read More

Network access control authentication: Are you ready for 802.1X?
In the NAC products we tested, authentication varies from very strong to very weak, and every point in-between. When starting down your path of evaluating NAC products, decide very early what kind of authentication mechanism you want, if any. Read More

Make Facebook, Twitter and other sites more secure with HTTPS Everywhere
A new plugin for Firefox from the Electronic Frontier Foundation (EFF) and The Tor Project allows you to encrypt all of the information you send to popular sites such as Facebook, Twitter and other popular sites. This means any information you send will be encrypted in transit and fairly safe from snooping and sniffing. Read More

How To use Gmail to safely access email from abroad
If you can't bear to be parted from your email inbox when you venture abroad, it's important to ensure that the wireless connection you're using to get online is secure. Read More

 
 
 

Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

Computerworld and Network World: Best of Green IT

Computerworld and Network World: Best of Green IT Computerworld and Network World are teaming up to identify the top organizations leading the way with green-IT efforts and the coolest green-IT products. Computerworld will feature two ranked lists in its Oct. 25 issue: Top green-IT end-user organizations and a Top green-IT data center suppliers/vendors. Network World will feature the most effective green-IT products, as cited by survey respondents, in its Oct. 25 issue and online. Please fill out our short survey or forward this link to the person in your company best able to answer questions about IT energy issues. Surveys should be submitted by Thursday, July 1 at 12 noon EST.

SLIDESHOWS

A brief history of smartphones
How the smartphone went from a high-end enterprise device to an everyday consumer staple.

Summer gadget guide 2010
From a solar-powered watch to a speaker for your bike helmet and a nifty geocache finder, these 10 high-tech toys are perfect for summer.

MOST-READ STORIES

  1. Apple iPhone iOS 4 software update available today
  2. 40/100G Ethernet standard ratified
  3. Cross-site scripting: An old problem returns
  4. Six annoying router problems -- and solutions
  5. WEP must die in next 12 days
  6. Run on IPv4 addresses could exhaust supply by December
  7. iPhone management tools step it up with iOS 4
  8. Cisco sees billions in smart buildings
  9. An inside look at the Mac mini
  10. How to get into medal of honor beta

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: