Solved

End Point Security & NAC?

Posted on 2006-11-13
1
136 Views
Last Modified: 2010-04-10
We have had some discussions about End Point Security (determinig who a user is and if they are authorized to access the network - 802.1x) and Network Access Control - allowing users to different parts of the network (vlans) or not.

Is anyone doing this in their Enterprise?  How are you doing it?  What are you doing it with?  Would you do it again?  What would you do differently?  It it just a tremendously huge PITA - is it worth it?

Points split equally to on topic replies.

Thanks guys & gals.  :)
0
Comment
Question by:pseudocyber
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 20

Accepted Solution

by:
RPPreacher earned 500 total points
ID: 17931624
0

Featured Post

Enroll in June's Course of the Month

June's Course of the Month is now available! Every 10 seconds, a consumer gets hit with ransomware. Refresh your knowledge of ransomware best practices by enrolling in this month's complimentary course for Premium Members, Team Accounts, and Qualified Experts.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Even if you have implemented a Mobile Device Management solution company wide, it is a good idea to make sure you are taking into account all of the major risks to your electronic protected health information (ePHI).
I had an issue with InstallShield not being able to use Computer Browser service on Windows Server 2012. Here is the solution I found.
Internet Business Fax to Email Made Easy - With  eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, f…
Michael from AdRem Software outlines event notifications and Automatic Corrective Actions in network monitoring. Automatic Corrective Actions are scripts, which can automatically run upon discovery of a certain undesirable condition in your network.…

729 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question