This resource is no longer available

NAC and Endpoint Security Demystified

This webcast will explain the steps in setting up a remote or branch office securely -- outlining the options and the pros and cons of each technology -- without breaking the bank.

Network access control (NAC) technology for securing the enterprise network endpoint is a ballooning product market for both security- and network-centric vendors. This webcast will outline the endpoint security technologies and product feature sets available to enterprises today. Topics will include:

  • Essential policies and baseline controls for endpoint systems
  • How different products assess endpoint health; thick agents, on-demand agents and agent-less configurations
  • Overview of Vista's impact on endpoint security; pros and cons
  • Inline and out-of-band network devices


Joel Snyder Senior Partner, Opus One

Joel is a speaker at our security seminars: Joel has been working with networks and information security since 1981, when he started consulting on X.25 and public key cryptography, and he's been very busy ever since. He has been a member of the ISO and ITU committees which write network standards, has authored several books and hundreds of articles. He was the conference director for VPNCON, and has advised and trained thousands of people privately and at conferences around the world on networking, security, messaging, and VPNs. His home network has run almost every protocol you can think of, and he regularly changes his WEP keys.

As an author and speaker, he's received numerous awards, recognizing his work to improve enterprise IT. He's helped over 200 private and public organizations (many of which you've heard of) with their networking, email, and security problems.

Symantec Corporation
Mar 20, 2007, 09:00 EDT (13:00 GMT)

This resource is no longer available.