Defending against the rogue – unwanted users, devices and applications |

Defending against the rogue – unwanted users, devices and applications

Report Author(s): Fran Howarth


Download

NAC technologies have evolved over the past decade since their introduction and are now essential tools for ensuring that only known and appropriate devices, applications and users can access network resources, whilst keeping those that pose a security threat off the network, or limited to only necessary resources, until issues are resolved. They improve an organisation’s risk posture and are key for aiding organ- isations in achieving their compliance and governance obligations, whilst allowing them to embrace new, more effective ways of working in a secure and efficient manner.

Source:

Bloor Research

Bloor is an independent research and analyst house focused on the idea that Evolution is Essential to business success and ultimately survival. For nearly 30 years we have enabled businesses to understand the potential offered by technology and choose the optimal solutions for their needs.

Left Menu Icon