Viruses and malware are often stopped by software defenses that run on the desktop; in fact, the antivirus, antispyware and other security suite software business has rapidly become a very lucrative ...
Burton Group VP and Network World columnist Dan Blum seems to agree with me that Vista belongs on your desktops. Not immediately, he thinks, but following your normal deployment schedule of new ...
One of the first things Microsoft says it will do with its recently announced Network Access Protection, or NAP, is to protect remote access VPNs. It is good to protect the remote end of VPN ...
At its Worldwide Partner Conference in Toronto, Microsoft said it plans to establish NAP as an industry standard. The technology, previously described by some executives as Active Defense technology, ...
SSL VPN product company Aventail Corporation has joined Microsoft's newly launched Network Access Protection program SEATTLE -- Leading SSL VPN product company Aventail Corporation announced it has ...
Network access control technology was the darling of the security industry in 2006, as vendors spent much of their time squawking about how their NAC offerings could do just about everything but cure ...
Microsoft will issue a preview of a new conditional access capability for organizations using SharePoint Online and OneDrive for Business, starting on Friday. Specifically, Microsoft plans to release ...
MANHASSET, N.Y. — Microsoft and Cisco Systems will collaborate to make their emerging products for network security compatible, the companies disclosed on Monday (Oct. 18). The vendors had been ...
Microsoft has taken the next step in making its end-to-end security architecture a reality. On Monday, several companies announced they will be working with the software giant's Network Access ...
Microsoft and the Trusted Computing Group (TCG) have joined forces to create better interoperability between network access control solutions with the announcement of a new specification which ensures ...
Network Access Control (NAC) sounds like something of a panacea: technology that can not only authenticate who is using your company’s network, but also ensure that users’ methods of access are ...
From Russian and Chinese hackers to WikiLeaks and North Korea, nefarious actors have long targeted federal systems, looking to steal sensitive national security information and disrupt government ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results