Enforcing Endpoint Compliance
sponsored by McAfee, Inc.

This technical brief looks at how to Police managed and unmanaged systems with Network Access Control (NAC). It explores the current situation and driving concerns such as when employees bring in their own laptops, tablets, and smartphones or a business unit decides to hire contractors and increasing support for remote and mobile endpoints while maintaining compliance with endpoint policies.

It then goes on to highlight solutions to the concerns such as

  • Mobile laptops outnumber stationary desktops
  • Smartphones and tablets are being adopted at a record-setting rate
  • Macs are becoming commonplace corporate endpoints
  • Desktop and server virtualization is exploding, making it easier to create rogue, unmanaged clients
  • Personal PCs are used for remote access to corporate networks, and also in “Bring your own PC” initiatives to cut capital costs
  • Many companies rely on contracted and outsourced labour, a workforce with its own set of laptops,
  • smartphones, and tablets
(THIS RESOURCE IS NO LONGER AVAILABLE.)
 
Available Resources from McAfee, Inc.
See what other users are reading via our Daily Top 50 Report
.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement