As information technology becomes more strategic and essential, access to networks and applications must be pervasive yet secure and controlled. The purpose of Network Access Control (NAC) has evolved beyond simply managing network access and ensuring endpoint policy compliancc. NAC systems today must integrate with other network security components and increase their built-in capabilities to includc support for intrusion detection, rolebased application access control, network and application visibility and monitoring, leakage detection, VPNs, and other network security technologies. In fact, we need a new unified vision and understanding of network security: one that involves multiple network security functions working together dynamically using open standards. This vision of unified network security has been called "NAC 2.0.". © 2009 Vieweg+Teubner | GWV Fachverlage GmbH, Wiesbaden.
CITATION STYLE
Hanna, S. (2009). NAC 2.0 - Unifying network security. In ISSE 2008 - Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2008 Conference (pp. 144–151). https://doi.org/10.1007/978-3-8348-9283-6_15
Mendeley helps you to discover research relevant for your work.