A University of Portland student has figured out how to evade the NAC endpoint check that was supposed to be part of logging into the campus network. It turned out he discovered that under certain ...
ARLINGTON, Va. -- According to a network access control expert, NAC implementations are often more difficult than they need to be because companies don't have a good understanding of their networks, ...
In this age of worms, zombies, and botnets, mobile computers themselves are a kind of Trojan horse. Do you know where that computer’s been? No, you really don’t. In its most basic form, NAC (network ...
Enterasys has wheeled out a bundle of its technology, called Secure Open Convergence, to protect VoIP networks – and that protection includes NAC. VoIP is a difficult area for NAC because NAC relies ...
In a world where data breaches seem to be happening more frequently, and more employees work remotely, businesses are looking for ways to tighten security on their networks. One way to do this is by ...
Leeron is a New York-based writer who specializes in covering technology for small and mid-sized businesses. Her work has been featured in publications including Bankrate, Quartz, the Village Voice, ...