This resource is no longer available

NAC at the Endpoint: Control Your Network through Device Compliance

Cover
The IT network perimeter is dissolving and becoming increasingly difficult to secure. This is due to the growing number of devices and methods of access, such as employees working from home or on the road, and logon requests from contractors, clients and other guests. To manage who and what connects to their network, organizations are turning to NAC, which is best deployed at the endpoint level. Software-based NAC is proving superior to hardware-based solutions as it easily provides coverage for all existing endpoint devices and new ones as they are added. Software-based NAC can also be deployed across an organization in stages, ensuring minimal impact on infrastructure and IT resources.
Vendor:
Sophos, Inc.
Posted:
01 Jul 2008
Published
01 May 2008
Format:
PDF
Length:
7 Page(s)
Type:
White Paper
Language:
English

This resource is no longer available.