Solved

End Point Security & NAC?

Posted on 2006-11-13
1
135 Views
Last Modified: 2010-04-10
We have had some discussions about End Point Security (determinig who a user is and if they are authorized to access the network - 802.1x) and Network Access Control - allowing users to different parts of the network (vlans) or not.

Is anyone doing this in their Enterprise?  How are you doing it?  What are you doing it with?  Would you do it again?  What would you do differently?  It it just a tremendously huge PITA - is it worth it?

Points split equally to on topic replies.

Thanks guys & gals.  :)
0
Comment
Question by:pseudocyber
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 20

Accepted Solution

by:
RPPreacher earned 500 total points
ID: 17931624
0

Featured Post

Free Tool: Site Down Detector

Helpful to verify reports of your own downtime, or to double check a downed website you are trying to access.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
AD Design Best Practices 6 61
CentOS 7 wireless 2 80
PoE Injector and switch 2 48
ICT security firms and audit/assurance offerings 3 31
Even if you have implemented a Mobile Device Management solution company wide, it is a good idea to make sure you are taking into account all of the major risks to your electronic protected health information (ePHI).
Don’t let your business fall victim to the coming apocalypse – use our Survival Guide for the Fax Apocalypse to identify the risks and signs of zombie fax activities at your business.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

737 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question