Today, the Internet is a vast network of connections: people to people, people to things, and things to things. This results in a complex melting pot of security and network management challenges. In particular, all connected devices remain a major cybersecurity point of vulnerability.
Perimeter-based security alone cannot prevent an attack from spreading laterally once inside the network itself. Likewise, with simple endpoint security: the moment the endpoint is compromised, all other devices connected to the same network become potentially highly vulnerable as well. We need a smart way to solve this challenge.
In this webinar, we will provide you with the guidance necessary to quickly lock down any non-compliant or compromised devices to maintain a high level of cybersecurity compliance.
Specifically, we will:
- How NAC enhances Cyber Defense Strategy
- Discuss the best approach to Multi-Layered Access Control
- Layer 2: ARP Enforcement (using Network Sensor)
- Layer 3: TCP reset (using Mirror Sensor)
- Layer 3: Inline enforcer (Dual-homed Gateway)
- Agent: NIC/Power Control, Alert Popup
- 802.1x: Built-in RADIUS server
- DHCP: Built-in DHCP server
- Switch port shutdown (SNMP)
- How NAC Rapid Deployment is Critical for Network Security