IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

Network Access Control

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Network access control (NAC), also called network admission control, is a method of bolstering the security of a proprietary network by restricting the availability of network resources to endpoint devices that comply with a defined security policy. A traditional network access server (NAS) is a server that performs authentication and authorization functions for potential users by verifying logon information.  … 
Definition continues below.
Network Access Control Multimedia (View All Report Types)
 
The 4 IAM Focal Points
sponsored by IBM
WEBCAST: In this webcast, you will uncover the four focal points of IAM.
Posted: 02 Mar 2015 | Premiered: May 23, 2014

IBM

Preventing Insider Threats in Real-Time
sponsored by IBM
WEBCAST: Access this webcast to learn about a security identity management platform to help you thwart insider threats by tracking the users.
Posted: 27 Feb 2015 | Premiered: Jun 16, 2014

IBM

How ObserveIT Helped AIG to Pioneer a User-Centric Security Strategy
sponsored by ObserveIT
WEBCAST: This webcast describes how global insurance company AIG benefited from a user activity monitoring solution from Observe IT.
Posted: 28 Oct 2014 | Premiered: Oct 28, 2014

ObserveIT

Remote Replication of an Oracle 10g Database Using Continuous Access/EVA
sponsored by Hewlett-Packard Company
WEBCAST: View this Webcast to learn best practices for deploying remote replication of an Oracle database. Discover how to properly manage replication so it will positively affect database performance.
Posted: 24 Oct 2007 | Premiered: Jul 12, 2007, 11:00 EDT (15:00 GMT)

Hewlett-Packard Company

CA Data & Resource Protection
sponsored by CA Technologies.
VIDEO: CA data & resource protection is a set of solutions that provide a proactive approach to privileged user management and data loss prevention by securing sensitive information and critical systems, all without impacting normal business and IT activities. Watch this interactive video to learn more.
Posted: 01 Jun 2010 | Premiered: 01 Jun 2010

CA Technologies.

Mitigating Insider Threats
sponsored by IBM
WEBCAST: This exclusive webcast examines a security solution designed to help you manage privileged identity access and centrally manage, audit and control shared identities across the enterprise to help prevent internal incidents from occurring.
Posted: 14 Aug 2013 | Premiered: Aug 14, 2013

IBM

The "Hard Truths" About Managing Administrative and Application Identities
sponsored by Cyber-Ark Software
VIDEOCAST: This videocast will examine the "hard truths" around managing administrative and application identities and suggest a practical approach to include privileged identity management in your overall governance, risk management and compliance strategy.
Posted: 16 Jul 2008 | Premiered: Jul 16, 2008, 09:00 EDT (13:00 GMT)

Cyber-Ark Software

Cloud Access 360 Overview Video
sponsored by Intel
VIDEO: Intel’s Director of Product Management presents the need for enterprise class access control to the cloud. Learn about SSO for the cloud and how to avoid common pitfalls when deploying across multiple cloud providers.
Posted: 29 Mar 2011 | Premiered: 29 Mar 2011

Intel

Three Key Areas for Improving your Compliance Programs
sponsored by CA Technologies.
PODCAST: This podcast focuses on the area of compliance, with a particular emphasis on the role of identity and access management in achieving compliance. It explores some of the key issues in compliance, and highlights techniques and best practices in identity and access management that can simplify and strengthen your compliance challenges.
Posted: 24 Nov 2010 | Premiered: Oct 21, 2010

CA Technologies.

Securing Virtual Environments
sponsored by CA Technologies.
PODCAST: Listen to this podcast for insight as well as an understanding of what security solutions are available now to help you address the issues.
Posted: 06 Oct 2010 | Premiered: Oct 6, 2010

CA Technologies.
 
 
NETWORK ACCESS CONTROL DEFINITION (continued): …  In addition to these functions, NAC restricts the data that each particular user can access, as wellas implementing anti-threat applications such as firewalls, antivirus software and spyware-detectionprograms. NAC also regulates and restricts the things individual subscribers can do once they are connected. Several major networking and IT vendors have introduced NAC products.NAC is ideal for corporations and agencies where the user environment can be rigidly controlled. However, some administrators have expressed doubt about the practicality of NAC deployment in networks with large numbers of … 
Network Access Control definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement