IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

Network Access Control

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Network access control (NAC), also called network admission control, is a method of bolstering the security of a proprietary network by restricting the availability of network resources to endpoint devices that comply with a defined security policy. A traditional network access server (NAS) is a server that performs authentication and authorization functions for potential users by verifying logon information.  … 
Definition continues below.
Network Access Control Multimedia (View All Report Types)
 
Network Evolution University: Unified Wired and Wireless
sponsored by SearchNetworking.com
VIRTUAL ENVIRONMENT: In this classroom, you'll learn how enterprise network managers can build a unified access layer for wired and wireless LANs, establish unified network infrastructure to meet the needs of both wired and wireless users, and deploy network discovery and troubleshooting capabilities that span both wired and wireless access networks.
Posted: 18 Jul 2013 | Premiered: 22 Jul 2013

SearchNetworking.com

Solidifying Cloud Security
sponsored by Ping Identity Corporation
VIDEO: This video will show you how Ping Identity's partner Fishnet Security enables clients to manage risk, meet compliance requirements and reduce costs while maximizing security effectiveness and operational efficiency.
Posted: 03 Feb 2015 | Premiered: 21 Jan 2013

Ping Identity Corporation

Securing Virtual Environments
sponsored by CA Technologies.
PODCAST: Listen to this podcast for insight as well as an understanding of what security solutions are available now to help you address the issues.
Posted: 06 Oct 2010 | Premiered: Oct 6, 2010

CA Technologies.

CA Cleanup: Mainframe Security Databases: ACF2, Top Secret, IBM RACF
sponsored by CA Technologies.
SOFTWARE DEMO: Over a period of time security databases accumulate unused, obsolete user ids and entitlements. This demonstration showcases the three causes and solution sets to security data accumulation.
Posted: 17 Jun 2008 | Premiered: 13 Jun 2008

CA Technologies.

Podcast: Automating Access Certification in Just 17 Days
sponsored by Aveksa
PODCAST: This podcast describes why one of your peers implemented a particular IAM solution to automate their certification process and also offers best practices that will help you as you start your own IAM program.
Posted: 10 Aug 2012 | Premiered: Aug 10, 2012

Aveksa

PowerBroker Password Safe: Security, Compliance, Productivity
sponsored by BeyondTrust Corporation
TRIAL SOFTWARE: Uncover how PowerBroker Password Safe can help you secure access to privileged accounts, effectively preventing intentional or accidental harm and malicious activity that can be devastating to your business.
Posted: 29 Apr 2013 | Premiered: 29 Apr 2013

BeyondTrust Corporation

Application Discovery Tool
sponsored by Sophos, Inc.
TRIAL SOFTWARE: With the Sophos Application Discovery Tool, you can quickly perform a scan and find the applications installed on your network, both legitimate and unwanted. The tool can be run without uninstalling or deactivating your current anti-virus software.
Posted: 16 Apr 2009 | Premiered: 29 Feb 2008

Sophos, Inc.

Global Security University: IAM Integration Classroom
sponsored by IBM
VIRTUAL ENVIRONMENT: This Information Security Classroom focuses on identity and access management (IAM) strategies for hosted and cloud-based systems accessed by company-owned and employee-owned devices.
Posted: 25 Jul 2013 | Premiered: 25 Jul 2013

IBM

Advanced Authentication Methods: Software vs Hardware
sponsored by CA Technologies.
WEBCAST: View this webcast to discover the advantages of a software-based authentication solution and how it can help your organization extend strong authentication to all of your employees, partners and customers in a secure, convenient, cost effective manner.
Posted: 01 Jul 2011 | Premiered: Jun 30, 2011, 10:00 EDT (14:00 GMT)

CA Technologies.

Webinar: The Big Picture - Unified Subversion & Git Access Control and Auditing
sponsored by WANdisco
WEBCAST: Consistent access control and auditing are now more important than ever for Agile workflows, corporate policies, and regulatory compliance. Until now, organizations using Subversion and Git had no way to standardize enforcement. This webinar focuses on new tools that enable company-wide standardization.
Posted: 20 Jun 2014 | Premiered: Dec 31, 2013

WANdisco
 
 
NETWORK ACCESS CONTROL DEFINITION (continued): …  In addition to these functions, NAC restricts the data that each particular user can access, as wellas implementing anti-threat applications such as firewalls, antivirus software and spyware-detectionprograms. NAC also regulates and restricts the things individual subscribers can do once they are connected. Several major networking and IT vendors have introduced NAC products.NAC is ideal for corporations and agencies where the user environment can be rigidly controlled. However, some administrators have expressed doubt about the practicality of NAC deployment in networks with large numbers of … 
Network Access Control definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement