IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

Network Access Control

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Network access control (NAC), also called network admission control, is a method of bolstering the security of a proprietary network by restricting the availability of network resources to endpoint devices that comply with a defined security policy. A traditional network access server (NAS) is a server that performs authentication and authorization functions for potential users by verifying logon information.  … 
Definition continues below.
Network Access ControlWhite Papers (View All Report Types)
 
Imaging and Printing: Is Your Valuable Data Protected?
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper introduces a set of HP solutions that can help you assess, manage, and strengthen security within your organization.
Posted: 06 Nov 2014 | Published: 06 Nov 2014

Hewlett-Packard Limited

Tame Mobile and Cloud Security Risks by Becoming an IdP
sponsored by SecureAuth
WHITE PAPER: This white paper addresses the reasons enterprises should become Identity Providers (IdPs), what becoming an IdP involves, and why you should consider automating this process as much as possible.
Posted: 24 Oct 2014 | Published: 24 Oct 2014

SecureAuth

How to Mitigate the Risk of Insider Threats
sponsored by Digital Guardian
WHITE PAPER: This white paper explains how to successfully ward off insider threats by altering the operating environment.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

Digital Guardian

Evolve SiteMinder With RadiantOne
sponsored by Radiant Logic, Inc.
WHITE PAPER: This white paper features a federated identity service that unifies identity policies for simplified management, helping reduce costs for growing user environments.
Posted: 04 Jun 2014 | Published: 31 Dec 2013

Radiant Logic, Inc.

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: This whitepaper examines the major challenges of providing secure access in mobile environments and explores new security models, policies and controls that can help keep critical apps and data secure.
Posted: 24 Feb 2014 | Published: 30 Sep 2013

IBM

4 Key Components for an Enhanced Mobility Infrastructure
sponsored by Dell, Inc.
WHITE PAPER: In this white paper, discover the four components that are crucial to creating a flexible network access solution for mobile users, including flexible access management and scalable wired infrastructure.
Posted: 10 Sep 2014 | Published: 10 Sep 2014

Dell, Inc.

Prevent Fraud and Improve the User Experience with Mobile Access Management
sponsored by IBM
WHITE PAPER: This white paper examines the challenges of providing secure access in the mobile world and explores new security models, policies, and controls that can help to protect your critical assets and data.
Posted: 03 Dec 2014 | Published: 30 Sep 2013

IBM

Managing identities and access in the cloud
sponsored by IBM
WHITE PAPER: This white paper highlights the top identity and access management features needed for cloud deployments to ensure secure collaboration.
Posted: 06 May 2014 | Published: 31 Dec 2011

IBM

Stock Yards Bank and Trust Makes Employees Productive and Keeps Data Secure
sponsored by Imprivata
WHITE PAPER: This case study features one large, trusted U.S. bank's experience with a simplified authentication solution that enabled increased productivity, compliance, and security levels.
Posted: 10 Apr 2014 | Published: 28 Feb 2010

Imprivata

IAM for the Real World – Privileged Account Management
sponsored by Dell Software
WHITE PAPER: Read this e-book for essential information on common security issues with privileged account management – and how you can minimize or eliminate them.
Posted: 27 Feb 2014 | Published: 31 Dec 2012

Dell Software
 
 
NETWORK ACCESS CONTROL DEFINITION (continued): …  In addition to these functions, NAC restricts the data that each particular user can access, as wellas implementing anti-threat applications such as firewalls, antivirus software and spyware-detectionprograms. NAC also regulates and restricts the things individual subscribers can do once they are connected. Several major networking and IT vendors have introduced NAC products.NAC is ideal for corporations and agencies where the user environment can be rigidly controlled. However, some administrators have expressed doubt about the practicality of NAC deployment in networks with large numbers of … 
Network Access Control definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement