Insights

Genians Responds to Gartner’s May 2020 Market Guide for Network Access Control

Network Access Control still has a critical role to play in any cybersecurity plan whether it be visibility, asset management, control/segmentation, Zero Trust or security automation. Organizations should carefully consider the topics discussed in the Gartner NAC Market Recommendations section of the guide when researching and choosing a solution to ensure the solution chosen is the right fight for the organization’s business, network environment, and security initiatives. These front end considerations will pay dividends on the back end.

Read More »

Key Considerations for Network Access Control (NAC) Architecture in the IoT Era

RADIUS-based NAC vs Sensor-based NAC This article will focus on some of the Pros and Cons of central versus distributed architectures with respect to Network Access Control (NAC) solutions. During the decision making process when purchasing or implementing NAC solutions, the question of architecture is always at the forefront. Many factors come into consideration when

Read More »

Security or Compliance? Security and Compliance!

As organizations continue to struggle to address the challenges posed by a constant barrage of cyber-breaches and attacks, one question in particular comes to the fore: How is it that so many breaches, including some very large incidents, have occurred in environments where compliance with various governmental and/or industry security regulations has been taken quite

Read More »

Rethinking 802.1x

This article continues our series on “Multi-Layered Access Control,” which seeks to explore various approaches to network visibility and access control. While our last piece dealt with ARP-based strategies for securing endpoints, we now consider how the 802.1x protocol can be used as part of a broader, multi-faceted approach – offering operators a range of

Read More »

Genians’ virtuous NAC triangle to secure the IoT era

In the current world of ever-increasing cyber threats, network managers face a common set of fundamental challenges on a daily basis. Keeping one’s network safe and secure from the very real and myriad cyber dangers that exist today requires that one possess several key capabilities: first, the ability to know exactly what devices are accessing

Read More »

Secure your network by leveraging ARP

Even the most fledgling of network administrators are familiar with the ARP protocol and the role it plays in helping operators manage their networks. Indeed, ARP, or “Address Resolution Protocol,” is a stateless communication protocol critical to enabling basic packet transmission in every ethernet network. Its job is quite simple: ARP inspects incoming packets to

Read More »

Multi-Layered Access Control

Today, the Internet is a vast network of connections: people to people, people to Things, and Things to Things. This results in a complex melting pot of security and network management challenges because of the convergence of so many tools, technologies, and platforms. How successful are you in managing your network security in the new

Read More »

Part II – Empower Your IT/OT Convergence with Genians Next-Gen NAC Capabilities

Converging and integrating OT and IT therefore often requires a “modernization” effort to bring legacy OT systems up-to-date so they can safely be connected to an enterprise’s network without compromising overall systems availability and business continuity. Most legacy OT systems will require some level of upgrading or outright replacement in order to be manageable, secure,

Read More »

Next Generation of NAC Capabilities

As the challenges identified above manifest themselves increasingly, NAC platforms will need to be highly responsive to marketplace dynamics and the overall threat landscape – and accordingly innovative as well. The essential characteristics required of NAC technology going forward is that it provides enterprises with the flexibility required for them to carry out their business

Read More »

Staying Ahead of the IoT Security Curve With Reimaged NAC

The dramatic influx of IoT and other network-connected devices requires a radical new approach to management and security International Data Corp. forecasts that approximately 80 billion devices will be connected to the Internet by 2020, up from 11 billion today. This flood of internet of things (IoT) is expected to transform the corporate IT landscape

Read More »
Scroll to Top

We use cookies to help improve this website and enhance your browsing experience You can change your cookie settings at any time. • Privacy • Terms