Download now Free registration required
As time goes on, we'll be seeing more and more of 802.1X in the environments we support. We have to for due diligence. Allowing trusted and non-trusted hosts to connect to our networks without proper controls is really just turning a blind eye to security. You may have heard concerns or nightmare stories about 802.1X, but with the tools we have today and the method of implementation, this can be seamless in an environment and far exceeds any compliance requirements you may have.
- Format: PDF
- Size: 2214.97 KB