NAC at the endpoint: control your network through device compliance

NAC at the endpoint: control your network through device compliance
Protecting IT networks used to be a straightforward case of encircling computers and servers with a firewall and ensuring that all traffic passed through just one gateway. However, the increase in mobile workers, numbers and type of device and the amount of non-employees requiring network access, has led to a dissolving of that network perimeter. Access requests can come from anyone and anywhere, which is why organizations are turning to network access control (NAC) technologies. This paper discusses why NAC is important and how it should be implemented on the endpoint for maximum protection. Protecting IT networks used to be a straightforward case of encircling computers and servers with a firewall and ensuring that all traffic passed through just one gateway. However, the increase in mobile workers, numbers and type of device and the amount of non-employees requiring network access, has led to a dissolving of that network perimeter. Access requests can come from anyone and anywhere, which is why organizations are turning to network access control (NAC) technologies. This paper discusses why NAC is important and how it should be implemented on the endpoint for maximum protection.

Published on 03 November 2010

By Sophos
As a registered user of CBR you can skip the majority of this form. Registration is FREE so register now or log in if you're already a member.

Download whitepaper

I have read and accept the terms and conditions and privacy policy.
We'd like to keep you informed about relevant promotions, products and services, or if you would prefer not to receive these, uncheck this box.
If you would prefer not to hear from carefully selected third party companies uncheck this box
More White Papers

Join our network

716 people like this.
1535 people follow this.

Related Intelligence and Suppliers

White Papers

Latest Products

See more

Suppliers

Privcy Policy

We have updated our privacy policy. In the latest update it explains what cookies are and how we use them on our site. To learn more about cookies and their benefits, please view our privacy policy. Please be aware that parts of this site will not function correctly if you disable cookies. By continuing to use this site, you consent to our use of cookies in accordance with our privacy policy unless you have disabled them.