IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

Network Access Control

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Network access control (NAC), also called network admission control, is a method of bolstering the security of a proprietary network by restricting the availability of network resources to endpoint devices that comply with a defined security policy. A traditional network access server (NAS) is a server that performs authentication and authorization functions for potential users by verifying logon information.  … 
Definition continues below.
Network Access Control Reports
 
Enhancing Authentication to Go Beyond Username and Password Vulnerabilities
sponsored by HID
VIDEO: This brief video explores remote access security challenges and how to go beyond simple username/password combinations to enhance your authentication security strategy.
Posted: 15 Jun 2015 | Premiered: 05 Jun 2013

HID

Information Governance Solution from Symantec
sponsored by Symantec | Veritas
WHITE PAPER: This white paper explains how you can ensure your file storage repositories are secured. Read now to better manage data and make it more accessible while decreasing storage costs. Identify, protect, and archive your data to create a better understanding of its value to your organization.
Posted: 18 Jun 2015 | Published: 30 Jun 2013

Symantec | Veritas

A More Effective Approach to Scalable Data Classification
sponsored by Digital Guardian
WHITE PAPER: This white paper can help you easily focus your security on your most sensitive data by providing guidelines to effective data classification.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

Digital Guardian

How to Deliver Attribute-Driven Authorization with Your Current Identity Infrastructure
sponsored by Radiant Logic, Inc.
WHITE PAPER: This white paper introduces a federated identity service that delivers smarter, finer-grained authorization without uprooting your current identity infrastructure, enabling you to reap the benefits of attribute-driven access control by federating identities and creating dynamic groups.
Posted: 16 Oct 2014 | Published: 16 Oct 2014

Radiant Logic, Inc.

Authentication Strategy: Balancing Security and Convenience
sponsored by CA Technologies.
WHITE PAPER: This white paper explores advanced authentication methods to mitigate new and emerging threats.
Posted: 12 Jun 2015 | Published: 04 Dec 2014

CA Technologies.

Securing Your Customers Online
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses how you can easily add a second level of authentication to your web applications without inconveniencing your users.
Posted: 20 Jul 2015 | Published: 20 Jul 2015

Symantec Corporation

Cloud Sherpas Collaboration Assessment
sponsored by Cloud Sherpas
WHITE PAPER: This white paper explains how Collaboration Assessment can prioritize your initiatives and define specific solutions. Read now to eliminate uncertainty and maximize the value you get from Google's collaboration capabilities.
Posted: 12 Jun 2015 | Published: 12 Jun 2015

Cloud Sherpas

From Project to Product
sponsored by Red Hat
WHITE PAPER: Software developed by an open source community with testing, certification, documentation, training and support can help IT organizations experience lower middleware with total cost of ownership and risk. Read this white paper to learn about the benefits of open source technology.
Posted: 03 Aug 2015 | Published: 31 Dec 2014

Red Hat

ActivID® Authentication Appliance for Enterprise
sponsored by HID
BROCHURE: In this brochure, discover a solution that puts an end to your identity and authentication worries.
Posted: 07 Jul 2014 | Published: 20 Feb 2013

HID

Mobile Security Best Practices in a Healthcare Setting
sponsored by Insight
EGUIDE: This expert e-guide discusses 5 tips that you must consider when developing a mobile computing or healthcare BYOD strategy. Additionally, learn why device encryption, access control and third-party apps are common ways to manage and secure the smartphones and tablets used in a health care organization.
Posted: 15 Oct 2014 | Published: 15 Oct 2014

Insight
 
 
NETWORK ACCESS CONTROL DEFINITION (continued): …  In addition to these functions, NAC restricts the data that each particular user can access, as wellas implementing anti-threat applications such as firewalls, antivirus software and spyware-detectionprograms. NAC also regulates and restricts the things individual subscribers can do once they are connected. Several major networking and IT vendors have introduced NAC products.NAC is ideal for corporations and agencies where the user environment can be rigidly controlled. However, some administrators have expressed doubt about the practicality of NAC deployment in networks with large numbers of … 
Network Access Control definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement