NAC at the endpoint: control your network through device compliance

NAC at the endpoint: control your network through device compliance

02:11, November 3 2010

By Sophos

Protecting IT networks used to be a straightforward case of encircling computers and servers with a firewall and ensuring that all traffic passed through just one gateway. However, the increase in mobile workers, numbers and type of device and the amount of non-employees requiring network access, has led to a dissolving of that network perimeter. Access requests can come from anyone and anywhere, which is why organizations are turning to network access control (NAC) technologies. This paper discusses why NAC is important and how it should be implemented on the endpoint for maximum protection.

Protecting IT networks used to be a straightforward case of encircling computers and servers with a firewall and ensuring that all traffic passed through just one gateway. However, the increase in mobile workers, numbers and type of device and the amount of non-employees requiring network access, has led to a dissolving of that network perimeter. Access requests can come from anyone and anywhere, which is why organizations are turning to network access control (NAC) technologies. This paper discusses why NAC is important and how it should be implemented on the endpoint for maximum protection.
As a registered user of CBR you can skip the majority of this form. Registration is FREE so register now or log in if you're already a member.

Download whitepaper

Help us to better improve our communications by entering all or some of the additional fields below, then click 'Download White Paper' to be taken to the next page.


I have read and accept the terms and conditions and privacy policy.
We'd like to keep you informed about relevant promotions, products and services, or if you would prefer not to receive these, uncheck this box.
If you would prefer not to hear from carefully selected third party companies uncheck this box

More White Papers