RSS feed Get our RSS feed

News by Topic

network access control

Results 26 - 50 of 65Sort Results By: Published Date | Title | Company Name
By: ForeScout     Published Date: Aug 14, 2012
In a BYOD world, companies can choose to secure and manage the entire mobile device user pool or secure portions of that community. Either way, steps must be taken to prevent unauthorized access to network resources and data loss. Enterprises should consider solutions that allow policies to be applied based on user, device, network, application, and data leakage risks.
Tags : archetecting, flexible, strategy, for securing, enterprise, bring, device, byod
     ForeScout
By: ForeScout     Published Date: Aug 14, 2012
Business wants more fluid access to data while IT organizations must maintain security. As the variety of access and multitude of threats to network resources and sensitive information have grown, so has the need for more flexible and automated ways to effectuate security policies, controls and enforcement. Rarely is this need more keenly felt than at the network endpoint, where people, technology, information assets and requirements for security and compliance meet most directly.
Tags : pragmatic, path, achieving nac results, essential implementation, process, control, consideration, data
     ForeScout
By: ForeScout     Published Date: Jan 24, 2013
ForeScout is a leader in the 2012 Magic Quadrant for Network Access Control. Read this magic quadrant report, which is based on the assessment based on vendor's completeness of vision, including market understanding, product and more.
Tags : gartner magic quadrant, network access control, forescout, leader in network access control, nac, overall viability, it management
     ForeScout
By: CDW     Published Date: Oct 10, 2013
A team approach and careful consideration of operational and security issues will pave the way for effective guidance. The drivers are many, but big draws include the potential for greater productivity — giving people anywhere, anytime access to information via devices they’re comfortable with.
Tags : mobile device policy, mobile data policy, mobility goals, byod, user profile, device security, mobile applications, app availability
     CDW
By: Citrix Systems     Published Date: Feb 14, 2019
"Now that 72.3% of cloud users have a mix of on-prem/off-prem clouds, the networking game has changed. Traditional app delivery solutions can’t ensure reliable, secure access in a SaaS, multi-device, hybrid, and multi-cloud world.  Get this solution brief to learn why a holistic strategy innately reduces complexities that otherwise would prohitib visibility and control in distributed architectures. The brief also explains: - The Citrix Networking approach to delivering reliability and a high-quality experience - How to ensure reliable access to apps at branch and remote locations while keeping costs low - How to provide full visibility and analytics for your network, applications, users, and data"
Tags : 
     Citrix Systems
By: Citrix Systems     Published Date: Jun 04, 2019
Now that 72.3% of cloud users have a mix of on-prem/off-prem clouds, the networking game has changed. Traditional app delivery solutions can’t ensure reliable, secure access in a SaaS, multi-device, hybrid, and multi-cloud world. Get this solution brief to learn why a holistic strategy innately reduces complexities that otherwise would prohibit visibility and control in distributed architectures. The brief also explains: The Citrix Networking approach to delivering reliability and a high-quality experience How to ensure reliable access to apps at branch and remote locations while keeping costs low How to provide full visibility and analytics for your network, applications, users, and data
Tags : 
     Citrix Systems
By: Dell Software     Published Date: Jul 24, 2012
Quest Workspacetm Privilege Manager lets IT administrators grant selected privileges to users so they can update their own PCs, reducing help desk calls while maintaining a secure network. Elevate and manage user rights quickly and precisely with our Validation Logic targeting technology. Use privilege elevation rules from the Privilege Authority Community Edition, or create your own rules and allow administrator-level access to only the applications, Windows processes and ActiveX controls you deem safe.
Tags : user access, network security, verify files, elevate activex, setup.exe, setup.msi, elevate applications, target workstations
     Dell Software
By: Aerohive     Published Date: Feb 06, 2008
Craig Mathias, Principal of the Farpoint Group, explores the advent of cooperative control, an innovative new class of wireless infrastructure from Aerohive Networks. Aerohive’s cooperative control architecture gives you all of the benefits of autonomous access points and controller-based infrastructures, without the high OPEX or CAPEX associated with either approach. Cooperative control architecture represents an innovative approach to wireless LAN systems, one that incorporates a number of interesting features and corresponding benefits.
Tags : wireless lan, wlan, wireless architecture, wireless infrastructure, aerohive, wifi, wi-fi
     Aerohive
By: Cisco     Published Date: Jan 29, 2009
Wireless networking is an essential productivity tool for today's mobile workforce. With wireless networking, you and your employees can stay connected to your company's information resources virtually anytime, anywhere.
Tags : cisco, wireless networking, productivity tool, mobile workforce, router capacity, access point, secure network, control systems
     Cisco
By: Black Box Corporation     Published Date: Feb 22, 2011
This white paper explains the basics of NAC and simplifies the many confusing NAC options available in the marketplace.
Tags : lack box, black box network black box network, security, black box security, network security, access control, network access control, nac
     Black Box Corporation
By: Great Bay Software     Published Date: Feb 04, 2015
The majority of companies have a difficult time deploying NAC across the enterprise. No existing NAC solution provides access control for all endpoints and operating systems – leaving vulnerable blind spots on the network. Some company leaders spend hundreds of thousands – even millions – of dollars on a NAC solution only to spend years trying to implement the technology. As a result, this can turn into a very frustrating process. However, the solution intended to help you better secure and manage your network shouldn’t wind up creating greater risk and chaos. There are ways to set your network and your team up for success. Here are some tips to help you when considering deploying a NAC solution.
Tags : great bay, software, network, access, control, implementation, nac, enterprise
     Great Bay Software
By: Impact Radius     Published Date: Oct 08, 2014
If you are relying on affiliate networks you have no access to vital data to manage affiliate processes such as tracking, reporting, and contracting. The affiliate networks own the data and control what brands you are able to see. You receive an incomplete view of conversion and performance data, and you are unable to track the true source of every lead across multiple channels. So how could you manage your affiliate programs with the benefits of Big Data intelligence? Read this MarketingProfs whitepaper and get the Big Data intelligence you need to manage a successful affiliate program.
Tags : 
     Impact Radius
By: Raritan     Published Date: Jan 05, 2015
As an IT administrator, Lab, or Network Manager, you need to access and control multiple computer systems, perhaps widely dispersed, for routine maintenance as well as for real-time troubleshooting and repair. The tools must enable you to work quickly and securely to access any system regardless of type, brand, or location.
Tags : raritan, remote management, network management, data center
     Raritan
By: Cisco     Published Date: Nov 18, 2015
In January 2015, Cisco commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment enterprises may realize by deploying Cisco TrustSec. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of Cisco TrustSec on their organizations. The Cisco TrustSec solution simplifies the provisioning and management of highly secure access to network services and applications. Unlike access control mechanisms that work on network topology, Cisco TrustSec policies use logical grouping. Highly secure access is consistently maintained even as resources are moved in mobile and virtualized networks.
Tags : cisco, trustsec, tei, total economic impact, network
     Cisco
By: Bitium     Published Date: Dec 09, 2013
As enterprises large and small shift their information to the cloud, an explosion of SaaS tools are making it easier than ever for employees to collaborate and innovate. Much of this sharing is being done across time zones and physical locations, by workers who are telecommuting, working in shared or public spaces, and from open networks. Information is stored on central, third-party servers that are accessible across the company and the world by anyone with an internet connection. As a result, online security is increasingly being pushed to the forefront as a major corporate expense. Yet, 89% of the global information workforce lack clarity on how security applies to the cloud. “Data is suddenly everywhere, and so are the number of people, access points and administrators who can control – or worse, copy – the data." Please download the white paper to learn more.
Tags : single sign on, sso, identity as a service, idaas, access and identity management, identity access management, password management, password manager
     Bitium
By: NetCom Info     Published Date: Jul 16, 2009
NetCom's CCNA certification course teaches clients how to configure, install and maintain the following protocols:• Introduction to wireless networking concepts & terminology• Internet Protocol (lP)• Enhanced Interior Gateway Routing Protocol (EIGRP)• Serial Line Interface Protocol Frame Relay• Routing Information Protocol Version 2 (RIPv2)• Virtual Local Area Network (VLANs)• Ethernet and access control lists (ACLs)
Tags : ccna, cisco, networking, routing and switching, cisco certification, ccnp
     NetCom Info
By: Aventail     Published Date: Aug 21, 2009
Network Access Control (NAC) solutions has arrived, with the support of some of the largest vendors in the IT/networking world, its own consortium, the excitement of users at organizations of all types and sizes, real available solutions, and significant revenue generated. Learn more in this white paper.
Tags : vpn, ssl, nac, network access control, access control, remote access, remote access security, aventail
     Aventail
By: Aventail     Published Date: Aug 21, 2009
NAC is a multifaceted framework to thoroughly control who and what gets access to network resources, and help keep malware from entering the enterprise. Today, there are huge challenges to implementing as-yet immature NAC solutions on an enterprise-wide basis, including convoluted integration requirements, inadequate inspection capabilities, and weak policy management.
Tags : vpn, access control, security management, ssl, network access control, nac, policy management, security policies
     Aventail
By: Mirage Networks     Published Date: Aug 21, 2009
This industry report gives you the information you need to make decisions about how to secure your network by controlling access and by preventing endpoint infections and policy violations.
Tags : network security, nac, network access control, access control, endpoint security, end-point security, intrusion prevention, policy based
     Mirage Networks
By: Okiok     Published Date: Aug 21, 2009
Global Trust is a comprehensive Permission Management Infrastructure that centrally controls and manages user access Permissions to Web-based resources, servlets, Beans or any external application. Download this white paper and learn how the Global Trust solution enforces your policy consistently across your e-business and associates according to the planned security model (delegation, user's type, roles, policies, etc).
Tags : password management, access control, network access control, nac, permissions management, security management, okiok
     Okiok
By: Pointsec     Published Date: Aug 21, 2009
This paper will help security officers and staff of large organizations seeking to protect sensitive data on mobile computing devices.
Tags : wireless security, network security, laptop security, mobile computing, secure mobile, data protection, access control, vulnerability management
     Pointsec
By: TopLayer     Published Date: Aug 21, 2009
Enterprises without a sound intrusion prevention strategy across the three threat dimensions - undesired access, malicious content, and rate-based attacks - open the door to unacceptable risks and costs, especially from hybrid attacks.
Tags : intrusion prevention, network security, ips, access control, hacker, top layer, toplayer, 3-d multi-layered
     TopLayer
By: Trusted Network Tech     Published Date: Aug 21, 2009
Authentication technologies such as tokens and smart cards help meet the challenges of protecting sensitive data and securing application access. This white paper presents four cases in which an identity-based solution provides a compelling, low-cost alternative or complement to strong authentication technologies.
Tags : network management, network security, access control, nac, network access control, identity management, security management, authentication
     Trusted Network Tech
By: Trusted Network Tech     Published Date: Nov 06, 2006
This paper addresses several issues organizations should consider when analyzing the efficacy and costs of NAC solutions and looks at a complementary alternative technology based on TNT’s Identity™, which helps address and overcome some limitations of NAC solutions.
Tags : access control, nac, network, identity management, network access control, security, internet security, trusted network tech
     Trusted Network Tech
By: Symantec     Published Date: Jun 12, 2008
Looking for a network security solution? Whether you've already adopted NAC for your enterprise or are researching options, download this helpful survey presented by IDC about NAC benefits and vendor overviews.
Tags : network access control, network security, security, nac, symantec
     Symantec
Start   Previous    1 2 3    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics