Today, the Internet is a vast network of connections: people to people, people to things, and things to things. This results in a complex melting pot of security and network management challenges. In particular, all connected devices remain a major cybersecurity point of vulnerability. Perimeter-based security alone cannot prevent an attack from spreading laterally once inside the network itself. Likewise, with simple endpoint security: the moment the endpoint is compromised, all other devices connected to the same network become potentially highly vulnerable as well. We need a smart way to solve this challenge. In this webinar, we will provide you with the guidance necessary to quickly lock down any non-compliant or compromised devices to maintain a high level of cybersecurity compliance. Specifically, we will:
  • How NAC enhances Cyber Defense Strategy
  • Discuss the best approach to Multi-Layered Access Control
    • Layer 2: ARP Enforcement (using Network Sensor)
    • Layer 3: TCP reset (using Mirror Sensor)
    • Layer 3: Inline enforcer (Dual-homed Gateway)
    • Agent: NIC/Power Control, Alert Popup
    • 802.1x: Built-in RADIUS server
    • DHCP: Built-in DHCP server
    • Switch port shutdown (SNMP)
  • How NAC Rapid Deployment is Critical for Network Security

Free Expo Pass Code: 54SGENIAN

Scroll to Top

We use cookies to help improve this website and enhance your browsing experience You can change your cookie settings at any time. • Privacy • Terms