Security Basics: Managing the Threat Part 4
(Network Access Control and Gateway Protection)
In previous blogs we talked about the need to educate end users, knowing the details of what activity is occurring on your network, and managing the threat through compliance. In part 4, we’re going to talk about protecting your network and web/email traffic.
First let’s talk about Network Access Control. Most enterprises have widespread networks across multiple locations with hundreds or thousands of network ports at each. Protecting these networks gives you peace of mind that a rouge machine will not get on the network and potentially capture data or cause disruptions. Another way to think of this is network endpoint compliance. Compliant machines get access to the network.