About the Author

Insights
Kyeyeon Kim

Rethinking 802.1x

This article continues our series on “Multi-Layered Access Control,” which seeks to explore various approaches to network visibility and access control. While our last piece dealt with ARP-based strategies for securing endpoints, we now consider how the 802.1x protocol can be used as part of a broader, multi-faceted approach – offering operators a range of

Read More »
Insights
Kyeyeon Kim

Multi-Layered Access Control

Today, the Internet is a vast network of connections: people to people, people to Things, and Things to Things. This results in a complex melting pot of security and network management challenges because of the convergence of so many tools, technologies, and platforms. How successful are you in managing your network security in the new

Read More »
Solve IT
Kyeyeon Kim

Achieving Government Cybersecurity Compliance – NIST

Over the past few years, there has been much attention paid in the technology security trade press to the need for companies to become “NIST SP 800-171 Compliant.” Much of this has focused on the need for compliance to be achieved by the end of December 2017. However, with the deadline now 6 months behind

Read More »
Insights
Kyeyeon Kim

Next Generation of NAC Capabilities

As the challenges identified above manifest themselves increasingly, NAC platforms will need to be highly responsive to marketplace dynamics and the overall threat landscape – and accordingly innovative as well. The essential characteristics required of NAC technology going forward is that it provides enterprises with the flexibility required for them to carry out their business

Read More »
Solve IT
Kyeyeon Kim

Genian NAC Provides Incomparable Visibility into Your Network

Today, the Internet is a vast network of connections: people to people, people to devices, and devices to devices. This is a complex melting pot of security and network management challenges because of the convergence of technologies. How successful are you in managing your network security with the Internet of Things (IoT)? If you are

Read More »
Trends
Kyeyeon Kim

Four steps for IoT Initiatives to protect your network

We are well into an age of decentralization. Our offices are decentralized. We work all over the country and sometimes the world. Main offices, satellite offices, and the use of contractors are standard practice. Our workers are decentralized. They work in those offices or from their own homes. Sometimes they work from coffee shops. And

Read More »
Solve IT
Kyeyeon Kim

Finding an Enterprise Class NAC Solution Tailored for Businesses of all Sizes

It’s rare that cybersecurity gets mainstream press, but recent events have everyone from the average Twitter user to business owners focusing on protecting themselves from malicious attempts to disrupt service or access confidential information. Just last week, most of the eastern United States experienced the effects of a widespread DDoS attack. Many major businesses found

Read More »
Scroll to Top
Scroll to Top

We use cookies to help improve this website and enhance your browsing experience You can change your cookie settings at any time. • Privacy • Terms