Risk
7/27/2006
10:15 AM
50%
50%

Take Network Computing's NAC Survey

Share your opinions on Network Admission Control solutions. It takes just minutes!

6:15 --

Dear Dark Reader,

Network Computing needs your help. The publication is examining the issues surrounding the role of Network Admission Control solutions in enterprise security strategies. For the purposes of this survey the term "Network Admission Control" or its abbreviation "NAC" refers to a broad set of solutions that address the security issues related to devices connecting to a corporate network. Specifically, NAC solutions generally solve one or more of the following problems:

    1) Pre-connect host posture assessment
    2) Violating host quarantine
    3) Violating host remediation
    4) Post-connect posture monitoring
    5) Post-connect policy enforcement (with optional real-time network threat analysis).

Please take time to share your opinions on Network Admission Control solutions in general and within your organization. Your opinion is valuable to us.

The survey can be found here.

We sincerely appreciate your participation.

— The Staff, Dark Reading

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Latest Comment: good work
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-1009
Published: 2015-07-31
Schneider Electric InduSoft Web Studio before 7.1.3.5 Patch 5 and Wonderware InTouch Machine Edition through 7.1 SP3 Patch 4 use cleartext for project-window password storage, which allows local users to obtain sensitive information by reading a file.

CVE-2015-1486
Published: 2015-07-31
The management console in Symantec Endpoint Protection Manager (SEPM) 12.1 before 12.1-RU6-MP1 allows remote attackers to bypass authentication via a crafted password-reset action that triggers a new administrative session.

CVE-2015-1487
Published: 2015-07-31
The management console in Symantec Endpoint Protection Manager (SEPM) 12.1 before 12.1-RU6-MP1 allows remote authenticated users to write to arbitrary files, and consequently obtain administrator privileges, via a crafted filename.

CVE-2015-1488
Published: 2015-07-31
An unspecified action handler in the management console in Symantec Endpoint Protection Manager (SEPM) 12.1 before 12.1-RU6-MP1 allows remote authenticated users to read arbitrary files via unknown vectors.

CVE-2015-1489
Published: 2015-07-31
The management console in Symantec Endpoint Protection Manager (SEPM) 12.1 before 12.1-RU6-MP1 allows remote authenticated users to gain privileges via unspecified vectors.

Dark Reading Radio
Archived Dark Reading Radio
Whats the future of the venerable firewall? Weve invited two security industry leaders to make their case: Join us and bring your questions and opinions!