Network Access Control: User and Device Authentication

Network Access Control: User and Device Authentication

Cover
Network access depends more and more upon wireless LANs and WANs, as well as virtual private network (VPN) remote access. All of these technologies have the potential to open the network perimeter to threats.

Read this white paper to learn more about:

  • The threat of viruses and worms
  • Additional controls to secure the enterprise network
  • Reducing the risk of exposure to attacks from malware
  • Ways to provide a robust computing environment to the enterprise
Vendor:
Intel Corporation
Posted:
31 Aug 2007
Published:
01 Aug 2005
Format:
PDF
Length:
4 Page(s)
Type:
White Paper
Language:
English

Download Your White Paper Now!