The Business Forum

"It is impossible for ideas to compete in the marketplace if no forum for
  their presentation is provided or available."           Thomas Mann, 1896

A Business Forum Round Table Luncheon
The Los Angeles Marriott Hotel in Los Angeles, California

Network Access Control
With Experts provided by:  Mi
rage Networks, Inc.

Those accepting our invitation to attend included:  

President - E-Novative, Inc. * Chief of Information Technologies - Southern California Association of Governments  Quality Assurance Manager - BT Infonet Corporation * Information Systems Security Officer - County of Los Angeles-LAC+USC Healthcare * Information System Security Analyst - County of Los Angeles-LAC+USC * Partner Tatum Partners * Security Analyst - Walt Disney Company * Director of Information Technology - Fashion Institute of Design & Merchandising * Technical Support Manager - Fashion Institute of Design & Merchandising * Security Consulting Engineer � BT Infonet Services Corporation * Systems Analyst � Los Angeles Department of Water & Power * Director, Government Security - The Aerospace Corporation * Professor of Information Systems California State University, Los Angeles * Director of Information Technology - Singer, Lewak, Greenbaum & Goldstein, LLP * Software Project Director - Sempra Energy Corporation * Network Manager � Los Angeles County - Department of Health Services * President - The Vantage Group, LLC

For the benefit of those of our members and supporters who could not
attend the meeting we present the following white papers, with contacts

Understanding Network Access Control

Contributed by: Mirage Networks, Inc.

Today’s technology environment is defined by mobility. It’s a productivity enhancement few organizations can be without - but the gain in productivity is causing an explosion of network security concerns. Consider the dramatic increase in the number and capabilities of mobile devices: according to Gartner, the dominant trend in computer buying has shifted to notebooks, which now make up 29% of computers sold in the US and 31% of those sold worldwide. And not only are laptops becoming the computer of choice for many corporate employees, more and more IP-enabled devices are coming into the mix - PDAs, mobile phones, and gaming systems, to name a few, each bringing new security vulnerabilities onto the network. Further enhancing productivity - and jeopardizing network security - is the ubiquity of access. Whether at home, in a hotel, at a Starbucks, or even on a park bench, users require and expect access to corporate networks at a data rate that enables full productivity. The widespread adoption of broadband and wireless networking has made mobile computing the standard, not the exception.

This has created great challenges for IT and security professionals. Controlling the devices accessing the network has become increasingly problematic as these devices move in and out of protected corporate networks, and as the line between office and personal computer blurs or even disappears. And now, it’s easier than ever for unmanaged IP devices to make their way into corporate networks.

Pre-Admission Network Access Control

Contributed by: Mirage Networks, Inc.

As you may recall from Part 1, the three main NAC standards (Cisco NAC, Microsoft NAP, TCG TNC) concern themselves with pre-admission (a.k.a. on-entry) NAC. Pre-admission checks are critical, but assuming that clean devices cannot become infected or hacked once ON the network could well be considered myopic. Post admission infection is addressed later in this document.

For a NAC solution to be effective, it must deliver two essential pre-admission capabilities. First, it must be able to identify a new device connecting to the network. Second, it must be able to test the endpoint for adherence to security policy and restrict access for those devices that do not meet defined entry criteria. Together, these capabilities should provide data that can be used to compare a device’s current security state against established security policy criteria, to determine how much or how little access that device is allowed.

Search Our Site

Search the ENTIRE Business Forum site. Search includes the Business
Forum Library, The Business Forum Journal and the Calendar Pages.


The Business Forum, its Officers, partners, and all other
parties with which it deals, or is associated with, accept
absolutely no responsibility whatsoever, nor any liability,
for what is published on this web site.    Please refer to:

legal description

Home    Calendar    The Business Forum Journal     Features    Concept    History
  Library    Formats    Guest Testimonials    Client Testimonials    Experts    Search  
News Wire
      Join Why Sponsor     Tell-A-Friend     Contact The Business Forum

The Business Forum
9297 Burton Way, Suite 100
 Beverly Hills, CA 90210
 Tel: 310-550-1984 Fax: 310-550-6121
 [email protected]