Security

Enforcing Endpoint Compliance

Download Now Free registration required

Executive Summary

This technical brief looks at how to Police managed and unmanaged systems with Network Access Control (NAC). It explore the current situation and driving concerns such as when employees bring in their own laptops, tablets, and smartphones or a business unit decides to hire contractors and increasing support for remote and mobile endpoints while maintaining compliance with endpoint policies. It then goes on to highlight solutions to the concerns such as ? Mobile laptops outnumber stationary desktops ? Smartphones and tablets are being adopted at a record-setting rate ? Macs are becoming commonplace corporate endpoints ? Desktop and server virtualization is exploding, making it easier to create rogue, unmanaged clients ? Personal PCs are used for remote access to corporate networks, and also in "Bring your own PC" initiatives to cut capital costs ? Many companies rely on contracted and outsourced labor, a workforce with its own set of laptops, smartphones, and tablets

  • Format: PDF
  • Size: 1312.33 KB