You searched for network access control/ | SC Media

Your search for network access control/ returned 15 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Cyberthreats remove

Your search for network access control/ returned 15 results

Sort Results:

Relevant Recent
Jeff Wilson
Opinions

The past, present and future of Network Access Control

Protecting the average corporate network from attacks is incredibly complicated and expensive. By the mid 1990s, complex toolkits had been supplanted by pre-built firewall software packages and intrusion detection systems. As performance and usability requirements increased, software moved to hardware, and by 2000, the number of companies buying and deploying perimeter security skyrocketed.
Peter Stephenson, technology editor, SC Magazine
Features

Product section: Meeting the challenge of managing access

Access control is the order of the day for this issue. All of our reviews focus on aspects of access control and management. This, of course, is a key aspect of enforcing the security of the enterprise. We address the topic with two First Looks and two Group Test reviews.
Case study: Network clarity
Features

Case study: Network clarity

A critical infrastructure company in Northern California gained visibility into its network...while securing its clients, reports Greg Masters.
Internal review: The insider threat risk
Features

Internal review: The insider threat risk

Thanks to WikiLeaks and a struggling economy, the internal threat has risen to a new level of prominence. Dawn Cappelli of Carnegie Mellon describes the profile of the rogue insider.
The next generation
Features

The next generation

AIG's CSO Paul DeGraaff says security professionals must gauge the risks of a younger workforce, Dan Kaplan.reports.
Next post in Features