NAC 2.0 - Unifying network security

0Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

As information technology becomes more strategic and essential, access to networks and applications must be pervasive yet secure and controlled. The purpose of Network Access Control (NAC) has evolved beyond simply managing network access and ensuring endpoint policy compliancc. NAC systems today must integrate with other network security components and increase their built-in capabilities to includc support for intrusion detection, rolebased application access control, network and application visibility and monitoring, leakage detection, VPNs, and other network security technologies. In fact, we need a new unified vision and understanding of network security: one that involves multiple network security functions working together dynamically using open standards. This vision of unified network security has been called "NAC 2.0.". © 2009 Vieweg+Teubner | GWV Fachverlage GmbH, Wiesbaden.

Cite

CITATION STYLE

APA

Hanna, S. (2009). NAC 2.0 - Unifying network security. In ISSE 2008 - Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2008 Conference (pp. 144–151). https://doi.org/10.1007/978-3-8348-9283-6_15

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free