Best NAC & Best Policy Management

Share this article:

Throughout the day, SC Magazine will be announcing the finalists from each of its 32 award categories, covering the Reader Trust, Professional and Excellence sections.

Best NAC product

Protecting host-based computing platforms and network resources from threats that are brought in by employees, vendors, contractors and guests involves a numbers of solu­tions and policies. From anti-virus and firewalls to IDS/IPS solutions, the products run the gamut. However, to control access to network resources at the endpoint, the tools companies often rely on are network access control (NAC) products. These solutions can be used to validate the existence of certain security measures and validate that they are properly configured and up-to-date. They also can validate the existence of cur­rent OS patches and can be used to manage the complexity associated with overseeing permissions and authorizations for various groups of users. Most will integrate with a common directory structure, some will provide local authentication capabilities, while others will match something on the endpoint – such as an agent or MAC address – to the authentication before allowing access to the protected network resources.

Finalists

  • Bradford Networks for Bradford Network's Network Sentry
  • Cisco for Cisco Identity Services Engine
  • ForeScout Technologies for ForeScout CounterACT
  • McAfee, Inc. for McAfee NAC (McAfee NAC includes three main components: McAfee NAC Appliance, McAfee NAC Software, and McAfee NAC Module for Network Security Platform)

Best Policy Management Solution

These products are used to enforce configuration policies to devices in an enterprise. This can include, but is not limited to, network configuration, encryption configuration, software configuration and hardware configuration. These products are able to audit devices against a policy created by an administrator, as well as have the ability to make policy changes to devices in the enterprise. Important functionality will include compliance management.

Finalists

  • Cisco for Cisco Identity Services Engine
  • McAfee, Inc. for a. McAfee ePolicy Orchestrator (ePO)
  • SonicWALL, Inc for SonicWALL E-Class Universal Management Appliance (UMA) EM5000
  • Symantec Corporation for Symantec Control Compliance Suite 10.5
  • Tripwire, Inc. for Tripwire Enterprise Solution 8.1
Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

More in News

Beazley: employee errors root of most data breaches, but malware incidents cost ...

Insurance firm Beazley analyzed more than 1,500 data breaches it serviced between 2013 and 2014.

Apple issues seven updates, fixes more than 40 vulnerabilities in iOS 8, OS 10.9.5

Apple issues seven updates, fixes more than 40 ...

In one of its infrequent "Update Surprisedays," Apple plugged holes, boosted security and added features.

Canadian telecom co. Telus unveils first transparency report

The company received more than 100,000 government requests for customer data last year.