You've requested...

Share this with your colleagues:

Achieving NAC Now and in the Future: The Role of SSL VPNs

If a new window did not open, click here to view this asset.

Download this next:

IT in Europe - May 2012

The May edition of IT in Europe explores the comeback of NAC and why the “old” NAC technology requires a makeover to truly protect your organisation.

Also featured in this edition:

  • Taking Control of Smartphone Proliferation
  • How to Strategise Enterprise Device Management
  • Top European Storage Priorities
  • And much more!

This month's issue is sponsored by line Ciena

These are also closely related to: "Achieving NAC Now and in the Future: The Role of SSL VPNs"

  • How the Business Infrastructure Control System can help you control your network

    Up to 20% of network devices are undetected and unmanaged. This is dangerous; you cannot protect what you don’t see.

    In this brief, learn how The Business Infrastructure Control System (BICS) can help your organization find and control all your switches, routers, and endpoints, including those which popular NAC tools miss.

  • Top VPNs secretly owned by Chinese firms

    Nearly a third of top VPNs are secretly owned by Chinese companies, while other owners are based in countries with weak or no privacy laws, potentially putting users at risk, security researchers warn. Dive into this story now.

Find more content like what you just read:

  • IPv6 Leakage and DNS Hijacking in Commercial VPN clients

    Services used by hundreds of thousands of people to protect their identity on the web are vulnerable to leaks, according to this report researchers at Queen Mary University of London (QMUL) and others.

    Download

  • The critical role of a secure VPN

    Secure remote work is hot topic even now, and as such, VPNs still have the full attention of security teams and professionals. While many organizations use VPN, some are not aware of the full scale of benefits it can provide. Leverage this white paper to learn why secure VPN is essential to remote workforce security.

    Download

  • Wireless LAN ITDC - Checklist #2

    Download this quick read to get an overview of technical requirements for wireless solutions, questions to ask potential vendors, and a list of vendors that have products that may meet your needs.

    Download

  • Hybrid work: VPN versus ZTAN

    VPNs have been the go-to method of accessing networks, but they can have some serious drawbacks in a hybrid environment. Learn about the potential benefits of adopting a ZTAN in the eBook.

    Download

  • The state of VPN security in 2021

    This 2021 VPN Risk Report surveyed 357 cybersecurity professionals, providing insight into the current remote access environment, the state of VPN within the enterprise, the rise in VPN vulnerabilities, and the role that zero trust will play in enabling access to apps going forward. Learn the results here.

    Download

  • Endpoint Protection Best Practices Manual: Combating issues, problems

    Consult this expert E-Guide for an overview of the evolved threats that are putting your endpoints at risk. Discover the must-see strategies for ensuring endpoint defense by clicking through to read more today.

    Download

  • Enforcing Endpoint Security: Creating a Network Security Policy

    As more and more users utilize non-company-owned devices to gain access to corporate data, organizations must take new steps to prevent the risks and damages of hostile, malware-infested and non-compliant endpoints. Access this e-guide to explore how to create a network endpoint security policy as well as best practices for enforcing them.

    Download

  • Your guide to secure remote access

    Secure remote access allows controlled access to an enterprise’s network, mission-critical systems, or any confidential data – enabling IT teams to provide secure and reliable access to employees, regardless of where they’re working. Read this e-guide to learn more about secure remote access strategies, best practices and more.

    Download

  • Securely Implement and Configure SSL to Ward Off SSL Vulnerabilities

    Expert Nick Lewis, CISSP, information security architect as Saint Louis University, covers in this e-guide how to implement and configure SSL's to ward off vulnerabilities within your organization.

    Download

  • The Pros and Cons of Delivering Web Pages Over an SSL Connection

    Though Secure Sockets Layer (SSL) offers distinct security advantages, there are drawbacks to this method of webpage delivery, as well. This expert e-guide explores the pros and cons of delivering webpages over an SSL connection. See if this strategy is right for your organization – read on to learn more.

    Download

  • Grocery chain ensures stock & security: Axis case study

    For years, Cardenas Markets, a grocery store chain, used traditional VPNs as their preferred method of provisioning access to their data. However, while this approach provided their partners with secure access, it failed to allow effective control. Read this case study to see how Axis helped Cardenas to revamp their access management program.

    Download

  • SSL Certificate Management: Common Mistakes and How to Avoid Them

    Errors are bound to occur when SSL certificate management is handled manually. Learn how to avoid these common mistakes by reading this expert e-guide by penetration tester at First Base Technologies, Rob Shapland.

    Download

  • The CISO’s guide to effective zero-trust access

    The zero-trust model of network security reduces the attack surface while providing secure access to applications and dynamic access control. If your organization is thinking about zero trust, download this e-book to educate yourself on a ZTA strategy that delivers visibility and control in 3 key areas. Read on to learn more.

    Download

  • What to look for in an SD-Branch solution

    As SD-WAN adoption continues to increase, IT administrators have begun to look for additional ways to reduce complexity and cost through SD-Branch. In this resource, under a checklist of 6 key capabilities to consider when evaluating SD-Branch solutions.

    Download

  • SDP for SASE: Security & Performance

    As network bandwidths increase, there is a growing need for secure remote access options than can handle increased availability, performance, and security. View this data sheet to discover the potential of SDP as part of a SASE platform.

    Download

  • How this banking network earned centralized monitoring

    Inside this case study, learn how Finanz Informatik quickly established a scalable and centralized network infrastructure, earning them real-time endpoint visibility and access control over their entire multi-tenant network.

    Download

  • IoT security for healthcare

    Learn about an IoT Security service that allows you to prevent threats and control the risk of IoMT, IoT, and IT devices on your network across all sites.

    Download

  • Zero-trust: Securing remote access to cloud applications

    Zero-trust access is an emerging practice that has arisen to address the need to enable secure remote access to applications for employees, partners, and other third parties, regardless of where the application resides. This white paper takes an in-depth look at the approaches to zero-trust and the benefits of each. Read on to learn more.

    Download

  • Mobile EndPoint Security and Management - Best Practices

    Learn more about today's mobility concerns and how to address them in this mobile security and management E-Guide. Read on and discover more about issues to address, tools to use and steps to take.

    Download

  • Essential Enterprise Mobile Security Controls

    How will you defend your organization from the threats posed by mobile devices? This expert E-Guide will help you understand the tools and controls you should be implementing to maintain security and protect sensitive data.

    Download

  • How one hospitality organization is driving digital transformation with Aruba

    Digitization and personalization continue to be paramount to unlocking operational efficiencies and elevating the guest experience. Steigenberger Hotels & Resorts is driving its digital transformation on an Aruba architecture. To learn more the benefits Aruba Networks brings to Steigenberger Hotels & Resorts, download this case study.

    Download

  • 9 essential elements of network security

    Network security isn't a one-size-fits-all strategy. Dive into the various segments of network security, and learn how they overlap and interact with each other.

    Download

  • 9 essential elements of network security

    Network security isn't a one-size-fits-all strategy. Dive into the various segments of network security, and learn how they overlap and interact with each other.

    Download

  • Is ZTNA the new VPN?

    More than half of the working population is expected to remain remote, even after the pandemic ends. In order to ensure workers are adequately protected, organizations are looking for better alternatives to the traditional VPN. Read this white paper to learn why ZTNA is the new VPN.

    Download

  • Where does DNS fit in the security stack?

    91% of malware uses DNS. The real question is: do you? The good news is you can do something about it. This e-book will show you how DNS can enhance your existing security strategy.

    Download

  • Buyer's Guide to Antimalware

    Companies face complicated buying decisions whenit comes to buying host-based antimalware, starting with whether to purchase a protection suite, andwhat to include in that all-in-one package.

    Download

  • Agentless EDT Unmanaged Devices

    As the number of organizations within an environment grows, security teams need a way to identify, manage and secure them. Read this solution brief for a closer look at Armis’ agentless endpoint detection and response (EDR) platform, which provides the visibility, compliance and security requirements needed to address this initiative.

    Download

  • The Guide to Protecting AWS Workloads

    46% of organizations are already embracing the Internet of Things (IoT) – and Gartner expects that number to rise dramatically in coming years. This e-guide provides an exclusive look at the IoT threat landscape and offers expert guidance for choosing the best-fit security tool to protect your IoT devices – read on to get started.

    Download

  • Iot Security

    This product overview explores the unique challenges of IoT devices in today’s enterprise networks and offers a closer look at the key features and capabilities of Palo Alto’s IoT security offering, designed to protect every device on your network at a greater ease of deployment – read on to get started.

    Download

  • Global IT Priorities Report 2016: Europe

    Computer Weekly’s in-depth study looks at IT spending priorities in Europe to help businesses benchmark their IT budget.

    Download

  • E-Book: Technical Guide on Combatting Emerging Web Threats

    Attackers are almost exclusively targeting enterprises with hacks perpetrated over the Web. As most enterprises move operations and functionality online, Web-based applications become a tempting threat vector for cybercriminals. Read this e-book for a look at Web threats and vulnerabilities – and how to protect your organization against them.

    Download

  • Mobile device controls: MDM security features vs. mobile native security

    When it comes to implementing mobile device management (MDM), not all organizations are the same. Read on to learn how to choose the right approach to MDM for your organization.

    Download

  • Discover what SASE can do

    Appliance-based network security has become obsolete, and VPNs have been stretched beyond their original design. Now, network security functions can be delivered from the cloud, and VPNs and legacy on-prem hardware can be replaced with a modern cloud-first SASE platform. Download this white paper to explore iboss’ Cloud SASE.

    Download

  • 13-step checklist to keep your business cyber-secure

    Today’s workforce handling sensitive data remotely is essential to keep your business operational and profitable. But, according to a recent report, 10,000 cyberattacks are made against small businesses in the UK every day. This e-guide provides a checklist of the following 13 best practices. Take the survey to access the complete list.

    Download

  • Threat prevention techniques: How to build a strong network

    Consult this expert E-Guide to learn how you can develop best practices for threat management and how you can build a strong network. Find out tips from the experts on how you can build a foundation for complete threat protect ion by consulting this guide now.

    Download

  • 2017 IT Priorities APAC - Survey Results

    Every year, Computer Weekly asks CIOs and senior IT decision-makers about the technologies and initiatives they will be investing in over the next 12 months. Here you can read the results from over 1000 responses in APAC and see how your 2017 plans compare.

    Download

  • Zero trust: Manage unmanaged devices

    The zero-trust security model has become a mainstay of security approaches. This white paper explores how to apply this security model to the exploding world of unmanaged devices. From webcams, printers, and building automation systems to industrial control systems and critical medical devices, learn about the evolving applications of zero trust.

    Download

  • Establish a platform to onboard transformation

    Engel & Völkers is on the digital edge of real estate. To keep up with the technology facilitating transformation, they had to establish a platform on which to modernize their business and centralize network management to reduce pressure on IT. Access this case study to learn how Aruba Networks helped make this vision a reality.

    Download

  • Get a pulse on the encrypted attacks wreaking havoc on business

    ThreatLabZ researchers recently uncovered, analyzed, and reported on threats leveraging encrypted channels prompting them to release an e-book on the state of encrypted attacks. Access it here to learn key insights on how attackers are accelerating their use of SSL/TLS encryption to bypass traditional defenses.

    Download

  • Solution Spotlight: Enforcing Mobile Security Through Secure Endpoint, Access and Applications

    Implementing a sound mobile security system starts with understanding what tools are out there and how they can be used effectively. This white paper will help you understand the security controls available to protect your workers and organization. Read on to get started.

    Download

  • Information Security Essential Guide: The Evolution of Threat Detection and Management

    This Information Security Essential Guide outlines the latest threat detection options available, provides a number of best practices for threat prevention, and outlines why your SIEM is a key player in the fight against cybercrime.

    Download

  • ZTNA vs VPN

    Will zero-trust network access (ZTNA) replace VPN to meet the challenges of remote work? Dive into this IDC white paper to discover the strengths and weaknesses of VPNs and zero-trust approaches for securing corporate networks and ensuring business continuity.

    Download

  • E-Guide: Best Practices to ensure secure mobile communication

    Learn more about the importance of mobile security and how you can ensure secure mobile communications in your enterprise.

    Download

  • Securing the enterprise application layer: Expert Guidelines

    If you're a security professional, the focus on application security in IT these days may leave you feeling out of the loop. Yet, in many cases, application security pros rely on the infrastructure team to provide a secure foundation.  Find out how securing a naming and directory service will help build a solid platform that application can trust.

    Download

  • Focus: Network security

    During the course of 2016 we saw the clamour around network security – which was already very loud – reach fever pitch. From allegations of nation state-level interference in crucial elections, to massive botnet attacks that brought down critical online services for millions, network security dominated mainstream news cycles for weeks on end.

    Download

  • Wireless LAN ITDC - Checklist #1

    In the first of SearchNetworking.com's three-part guide on selecting wireless products, this document takes a look at the business and technology issues associated with them and provides expert guidance on the benefits you can reap by taking advantage of the various types of wireless solutions.

    Download

  • The healthcare CISO’s guide to IoT security

    As a result of the pandemic, the usage and adoption of Internet of Things (IoT) devices in the healthcare industry has skyrocketed. Read The Healthcare CISO’s Guide to IoT Security for everything you need to know about clinical device management and IoT security in the healthcare industry.

    Download