Solved

End Point Security & NAC?

Posted on 2006-11-13
1
133 Views
Last Modified: 2010-04-10
We have had some discussions about End Point Security (determinig who a user is and if they are authorized to access the network - 802.1x) and Network Access Control - allowing users to different parts of the network (vlans) or not.

Is anyone doing this in their Enterprise?  How are you doing it?  What are you doing it with?  Would you do it again?  What would you do differently?  It it just a tremendously huge PITA - is it worth it?

Points split equally to on topic replies.

Thanks guys & gals.  :)
0
Comment
Question by:pseudocyber
1 Comment
 
LVL 20

Accepted Solution

by:
RPPreacher earned 500 total points
ID: 17931624
0

Featured Post

Portable, direct connect server access

The ATEN CV211 connects a laptop directly to any server allowing you instant access to perform data maintenance and local operations, for quick troubleshooting, updating, service and repair.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
deduplication > shared folder size weirdness? 1 59
ERR_NAME_NOT_RESOLVED 7 30
OSPF - Convergence & Downtime 9 33
VPN problems 4 23
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Most of the applications these days are on Cloud. Cloud is ubiquitous with many service providers in the market. Since it has many benefits such as cost reduction, software updates, remote access, disaster recovery and much more.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

860 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question