Best NAC & Best Policy Management

Share this article:

Throughout the day, SC Magazine will be announcing the finalists from each of its 32 award categories, covering the Reader Trust, Professional and Excellence sections.

Best NAC product

Protecting host-based computing platforms and network resources from threats that are brought in by employees, vendors, contractors and guests involves a numbers of solu­tions and policies. From anti-virus and firewalls to IDS/IPS solutions, the products run the gamut. However, to control access to network resources at the endpoint, the tools companies often rely on are network access control (NAC) products. These solutions can be used to validate the existence of certain security measures and validate that they are properly configured and up-to-date. They also can validate the existence of cur­rent OS patches and can be used to manage the complexity associated with overseeing permissions and authorizations for various groups of users. Most will integrate with a common directory structure, some will provide local authentication capabilities, while others will match something on the endpoint – such as an agent or MAC address – to the authentication before allowing access to the protected network resources.

Finalists

  • Bradford Networks for Bradford Network's Network Sentry
  • Cisco for Cisco Identity Services Engine
  • ForeScout Technologies for ForeScout CounterACT
  • McAfee, Inc. for McAfee NAC (McAfee NAC includes three main components: McAfee NAC Appliance, McAfee NAC Software, and McAfee NAC Module for Network Security Platform)

Best Policy Management Solution

These products are used to enforce configuration policies to devices in an enterprise. This can include, but is not limited to, network configuration, encryption configuration, software configuration and hardware configuration. These products are able to audit devices against a policy created by an administrator, as well as have the ability to make policy changes to devices in the enterprise. Important functionality will include compliance management.

Finalists

  • Cisco for Cisco Identity Services Engine
  • McAfee, Inc. for a. McAfee ePolicy Orchestrator (ePO)
  • SonicWALL, Inc for SonicWALL E-Class Universal Management Appliance (UMA) EM5000
  • Symantec Corporation for Symantec Control Compliance Suite 10.5
  • Tripwire, Inc. for Tripwire Enterprise Solution 8.1
Share this article:

Sign up to our newsletters

More in News

Apple hit with privacy class-action over iPhone location service

Apple hit with privacy class-action over iPhone location ...

A woman claims she did not realize the company was using location services to track her and accuses the company of giving the data to third parties.

Attackers compromise Gizmodo Brazil

Trend Micro is investigating whether a vulnerability was used to compromise Gizmodo Brazil and a logistics firm hosted by the same ISP.

Paddy Power breach impacting 650K customers dates back to 2010

Nearly 650,000 Paddy Power customers who made an account prior to 2010 had data compromised in a breach.