Rechercher
Contactez-nous Suivez-nous sur Twitter En francais English Language
 

De la Théorie à la pratique





















Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

Cisco Simplifies NAC for Enterprises

November 2007 by Marc Jacob

Cisco® announced the availability of the new Network Admission Control (NAC) Guest Server, adding the Secure Guest service to several existing Cisco NAC services that include roles-based posture assessment and profiling. The new Secure Guest service enables any organization to simplify the process of managing guest network access without overburdening information technology (IT) teams with the administrative overhead commonly associated with supporting corporate visitors.

The new Cisco NAC Guest Server and its Secure Guest service is appropriate for enterprise organizations of all sizes, and is suited for businesses that accommodate visitors, such as customers, suppliers or partners, on a frequent basis. This latest addition further expands Cisco’s NAC solution, enhancing a company’s ability to protect its organization’s assets, employees and information from guests and their devices while granting secure, flexible network access to those same visitors. The Cisco NAC Guest Server, which can operate with the Cisco NAC Appliance or the Cisco Wireless LAN Controller, allows authorized employees to provision guest accounts and grant access in a simple, secure manner. In doing so, it offloads substantial administrative pressure from IT.

In addition to enabling authorized employees to sponsor guests, the Cisco NAC Guest Server records the entire process, including a detailed history of guests accessing the corporate network. The server stores this information and can deliver reports to further enhance security management on an ongoing basis and for audits. Because the server operates in conjunction with the Cisco NAC Appliance and Cisco wireless local-area networks, providing mobile guest access within dynamic office environments can be woven seamlessly into IT’s broader network security infrastructure.




See previous articles

    

See next articles