sponsored by Extreme Networks
Posted:  02 Dec 2010
Published:  02 Dec 2010
Format:  PDF
Length:  8  Page(s)
Type:  White Paper
Language:  English

When you think about identity management, what comes to mind? Probably things like LDAP directories, strong authentication, and Single Sign-On (SSO) systems. In general, these technologies are used for access to Windows networks, e-mail, and other internal applications. Of course, network pipes provide the actual infrastructure for these application layer communications, but network identity is far more elementary than application-layer activity. Generally, network identity is associated with things like IP and MAC addresses, VLAN tags, and subnets. It also plays a role in security in areas like device authentication, VPNs, and IPSEC.

Access Control | Identity Management Software | Intelligent Databases | Networking | RFID | Security Threats

View All Resources sponsored by Extreme Networks

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement