What We Learned from Educause 2022

During Educause 2022, Genians had many great opportunities to hear powerful stories related to fundamental cyber security issues and we shared our solutions on how to approach this critical subject more effectively and economically using our Genians NAC-driven Zero Trust Network Access (ZTNA).

Read More »

Benefits and Challenges of Zero Trust Security Model

Implementing a Zero Trust framework ensures a high level of security within a network architecture through network access control and mitigates the risks of unauthorized access of a data breach. Where this model comes with loads of benefits, it also has some challenges. Learn more about the Zero Trust security model, benefits, and technical challenges.

Read More »

What Genians learned from 2020

Ensure Core Cybersecurity Requirements Are Met In This Unprecedented Time The requirements of Genians’ customers in 2020 shifted drastically due to COVID 19, presenting a significant challenge for anyone operating within the Cybersecurity realm. While many vendors scrambled to provide options for their customers, Genians’ leadership and experience with Cloud Managed / Unmanaged NAC and

Read More »

Genians Responds to Gartner’s May 2020 Market Guide for Network Access Control

Network Access Control still has a critical role to play in any cybersecurity plan whether it be visibility, asset management, control/segmentation, Zero Trust or security automation. Organizations should carefully consider the topics discussed in the Gartner NAC Market Recommendations section of the guide when researching and choosing a solution to ensure the solution chosen is the right fight for the organization’s business, network environment, and security initiatives. These front end considerations will pay dividends on the back end.

Read More »

Key Considerations for Network Access Control (NAC) Architecture in the IoT Era

RADIUS-based NAC vs Sensor-based NAC This article will focus on some of the Pros and Cons of central versus distributed architectures with respect to Network Access Control (NAC) solutions. During the decision making process when purchasing or implementing NAC solutions, the question of architecture is always at the forefront. Many factors come into consideration when

Read More »

Rethinking 802.1x

This article continues our series on “Multi-Layered Access Control,” which seeks to explore various approaches to network visibility and access control. While our last piece dealt with ARP-based strategies for securing endpoints, we now consider how the 802.1x protocol can be used as part of a broader, multi-faceted approach – offering operators a range of

Read More »

Genians’ virtuous NAC triangle to secure the IoT era

In the current world of ever-increasing cyber threats, network managers face a common set of fundamental challenges on a daily basis. Keeping one’s network safe and secure from the very real and myriad cyber dangers that exist today requires that one possess several key capabilities: first, the ability to know exactly what devices are accessing

Read More »

Multi-Layered Access Control

Today, the Internet is a vast network of connections: people to people, people to Things, and Things to Things. This results in a complex melting pot of security and network management challenges because of the convergence of so many tools, technologies, and platforms. How successful are you in managing your network security in the new

Read More »

Next Generation of NAC Capabilities

As the challenges identified above manifest themselves increasingly, NAC platforms will need to be highly responsive to marketplace dynamics and the overall threat landscape – and accordingly innovative as well. The essential characteristics required of NAC technology going forward is that it provides enterprises with the flexibility required for them to carry out their business

Read More »

Staying Ahead of the IoT Security Curve With Reimaged NAC

The dramatic influx of IoT and other network-connected devices requires a radical new approach to management and security International Data Corp. forecasts that approximately 80 billion devices will be connected to the Internet by 2020, up from 11 billion today. This flood of internet of things (IoT) is expected to transform the corporate IT landscape

Read More »
Solve IT
Scott MacDonald

Returning to the Office: 3 Tips to Secure Your Network

It may seem like just yesterday that IT teams worldwide scrambled to set up secure and efficient remote work environments. Now, we are seeing the beginnings of a return to office work. Here are some quick tips to ease the transition back to a stable baseline in your network environments.

Read More »

Why NAC? Why Genians?

Follow Us

Scroll to Top

We use cookies to help improve this website and enhance your browsing experience You can change your cookie settings at any time. • Privacy • Terms