Today, the Internet is a vast network of connections: people to people, people to things, and things to things. This results in a complex melting pot of security and network management challenges. In particular, all connected devices remain a major cybersecurity point of vulnerability. Perimeter-based security alone cannot prevent an attack from spreading laterally once inside the network itself. Likewise, with simple endpoint security: the moment the endpoint is compromised, all other devices connected to the same network become potentially highly vulnerable as well. We need a smart way to solve this challenge. In this webinar, we will provide you with the guidance necessary to quickly lock down any non-compliant or compromised devices to maintain a high level of cybersecurity compliance. Specifically, we will:
  • How NAC enhances Cyber Defense Strategy
  • Discuss the best approach to Multi-Layered Access Control
    • Layer 2: ARP Enforcement (using Network Sensor)
    • Layer 3: TCP reset (using Mirror Sensor)
    • Layer 3: Inline enforcer (Dual-homed Gateway)
    • Agent: NIC/Power Control, Alert Popup
    • 802.1x: Built-in RADIUS server
    • DHCP: Built-in DHCP server
    • Switch port shutdown (SNMP)
  • How NAC Rapid Deployment is Critical for Network Security

Scroll to Top

We use cookies to help improve this website and enhance your browsing experience You can change your cookie settings at any time. • Privacy • Terms