Network Access Control (NAC) stories - Page 8
Without being on the network, bad actors can’t achieve their nefarious goals. The combination of
technologies enabling the introduction and implementation of access control policies for corporate
infrastructure by devices in the control of users (people) or device-to-device communication (IoT) is
known as Network Access Control.
HPE and NEC team up, target mobile-first networking
Wed, 13th Apr 2016
#
nac
Hewlett Packard Enterprise and NEC form alliance to accelerate global adoption of mobile-first networking solutions.
If opportunity makes a thief, what stops one?
Mon, 25th Jan 2016
#
nac
Cisco’s Marc Solomon outlines the questions security professionals should ask when evaluating next-gen firewalls.
Mobile security company signs inTechnology as distie
Wed, 1st Jul 2015
#
nac
Juniper Networks' off-shoot Pulse Secure signs inTechnology as local distie, aiming to address 'challenging' mobile and access security issues in ANZ.
Juniper and Ruckus team up, target enterprises
Wed, 24th Jun 2015
#
nac
Juniper Networks and Ruckus Wireless have entered into a technology alliance to deliver open, wired and wireless networking solutions.
Check Point: Securing the data centre
Mon, 7th Apr 2014
#
nac
Check Point urges NZ firms to fortify virtual data centres against sophisticated cyber threats without compromising performance.
NZ Business Number: FAQs
Wed, 12th Mar 2014
#
nac
Following the formal launch of the New Zealand Business Number (NZBN) this week, the government has offered a run down of top tips and advice for companies.
Are you managing your workforce mobility?
Thu, 26th Dec 2013
#
nac
Workforce mobility is inevitable and must be carefully managed for security, says Trustwave sales manager Dean Curlew.
Observatory Crests bags ForeScout ANZ distie deal
Fri, 25th Oct 2013
#
nac
Observatory Crest has announced a partnership with one of the world's leading providers of network access control (NAC), ForeScout Technologies.
Top 3 security issues for BYOD
Thu, 27th Dec 2012
#
nac
BYOD trend in 2013 firms heightens security risks, data leaks and privacy issues as personal and enterprise device boundaries blur.
Your environment? Hostile territory.
Thu, 1st Nov 2012
#
nac
A Unisys survey across 12 countries reveals a stark reality: 80% of New Zealanders would sever ties with organisations responsible for data breaches.
Who’s listening?
Thu, 1st Jul 2010
#
nac
Security requirements and strategies apply to unifi ed communications solutions just as much as they do to traditional phone and email systems.
Emphasising value above cost: IT & the education vertical
Mon, 1st Sep 2008
#
nac
Resellers in New Zealand are helping K-12 schools understand the true value of IT and make the most of their limited budgets.
Cutting costs, not security
Fri, 1st Aug 2008
#
nac
Endpoint protection platforms are the biggest software expense for organisations' security budgets, but Gartner has revealed how to reduce costs.