TITLE

Big NAC on the Menu

AUTHOR(S)
Sausner, Rebecca
PUB. DATE
June 2006
SOURCE
Bank Technology News;Jun2006 Supplement, Vol. 19, p29
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article provides information on the potential market for network access control (NAC) solutions. It is estimated that the NAC market will reach $3.4 billion in four years. Cisco Systems Inc. is currently the biggest provider in the market and its 2005 acquisition of Perfigo has allowed it to add an overlay product to its existing infrastructure approach. Other NAC providers include Microsoft Corp., Symantec Corp., and Juniper Networks Inc.
ACCESSION #
21470453

 

Related Articles

  • The NAC labyrinth. Snyder, Joel // Network World;4/3/2006, Vol. 23 Issue 13, p1 

    The article reports on the demand for computer network access control (NAC) technology. NAC brought significant change to network security. Basic elements and fundamental approaches to NACs include edge control, core control and client control. Computer network infrastructure vendors whose NAC...

  • Reviving the perimeter. Sturdevant, Cameron // eWeek;11/16/2005, Vol. 22 Issue 45A, p20 

    The article reports that network software and hardware vendors will continue to build new network access control products in 2006. According to Symantec Corp.'s Internet Security Threat Report the urgency in admission control devices to accelerate the use of the network access control products...

  • NETWORK ACCESS CONTROL.  // Information Security;Sep2009, Vol. 11 Issue 8, p26 

    The article evaluates network access control products including the Juniper Unified Access Control from Juniper Networks, NAC Appliance from Cisco Systems and Network Access Control from Symantec.

  • Industry round-up.  // SC Magazine: For IT Security Professionals (UK Edition);Oct2006, p15 

    The article presents news briefs on the computer security industry. Cisco Systems and Microsoft have formed a partnership to work on a new architecture that allows their security technology platforms to work together. Breach Security has acquired ThinkingStone, a British Web application firewall...

  • Cisco, Microsoft to air net access plans. Messmer, Ellen // Network World;2/6/2006, Vol. 23 Issue 5, p8 

    The article reports that Cisco's John Chamber and Microsoft's Bill Gates will be sharing new information regarding their companies' network-access control plans at the RSA Conference in San Jose, California. Microsoft, together with several computer security technology firms, will also introduce...

  • Symantec, Juniper Unveil NAC Plans. Robert, Paul F. // InfoWorld;9/18/2006, Vol. 28 Issue 38, p19 

    This article presents information on a strategic partnership between Juniper Networks and Symantec to establish an integrated, standards-based access control and end-point compliance solutions in the U.S. The integration will comply with the Trusted Network Connect architecture. Both companies...

  • Threat Landscape and Lapses Justify Paranoia. Connolly, P. J. // InfoWorld;1/2/2006, Vol. 28 Issue 1, p34 

    This article focuses on the issue of security in information technology and computer industry. It was said that in 2005, security remained foremost on the minds of IT leadership. A project from Microsoft discover the first so-called zero-day exploit, identity theft, phishing, and spyware became...

  • RESELLERS GO LONG ON LAN LOCKDOWN. Hooper, Larry // CRN;10/24/2005, Issue 1168, p5 

    The article reports that the race to lock down the corporate local area network (LAN) is heating up with a slew of new network access control products poised to drive big sales gains for partners. Juniper Networks Inc., Sunnyvale, California, is delivering the release of its network access...

  • Tech giant comes knocking at seaports. Saccomano, Ann // Journal of Commerce (1542-3867);8/4/2003, Vol. 4 Issue 31, p33 

    Provides information on a telecommunications network from Cisco Systems Inc. that will allow the seaport to manage images and data necessary for effective access control and other security requirements. Factor which prompted the firm to develop the technology; Focus of the firm on containeryard...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics