Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


01:55 AM
Connect Directly

NAC Vendors in the Hot Seat

Cisco, Microsoft shared the dais, and their thoughts on NAC, here yesterday at Interop

LAS VEGAS -- Interop -- The big fish in network access control were together here yesterday: Cisco, Juniper, McAfee, and Microsoft, which nearly stole the show earlier in the week by announcing a deal with Trusted Computing Group. (See Vendors Get Their NAC Together.)

The four NAC rivals seemed mostly on the same page here during the "Truth About NAC" panel yesterday. Except, of course, when the talk came to standards. Cisco is now the only vendor that's not working with the TCG, and it's looking conspicuously lonely.

"We're down from three standards to two, but that's still one too many," said Vimal Solanki, senior director of worldwide product marketing for McAfee.

Russell Rice, director of product management for Cisco, said Cisco is focusing its standardization energy on the Internet Engineering Task Force's (IETF) emerging Network Endpoint Assessment specification. "That's the right area for standardization for us," he said. (See IETF Trains Its Sights On NAC.)

Cisco has held interoperability testing and demos with Microsoft and McAfee, and those interfaces will be built into Windows Server 2008 beta release, which will ship later this year, according to Paul Mayfield, group program manager for Microsoft.

Mayfield also said the upcoming Windows XP Service Pack 3 will include a NAC client. "Having the agent built into the OS reduces the cost of NAC deployment."

Rice, meanwhile, noted that in three of the four customer briefings he attended during Interop, the organizations were concerned about their outside contractors, or guest users, infecting their networks with their client machines. "NAC is for getting a handle on all the devices you can't easily manage, such as guests," he said, as well as reducing the risk of infection from internal clients.

Paul Hoffman, director of the Cybersecurity Association and moderator of the panel, said he was surprised the panelists were automatically including remote access in their NAC strategies, and not treating it as a special case. "All we care about is trusted access," says Karthik Krishnan, senior product line manager for Juniper, whether it's from the LAN or remote users.

Each vendor also offered a glimpse at what their NAC products would look like 18 months from now: Cisco's Rice said increased speed and more diverse form factors will make NAC more cost-effective.

Juniper's Krishnan said there will be more "use cases" for NAC: "Not all users will roll NAC across their network." Some may be focusing on securing a specific application, he said. "And devices will be coordinating with each other, with greater visibility among each other."

Microsoft's Mayfield said multivendor integration will increase. "And you'll see more emergence of higher-level policies to bring those things together. XP SP3 is going to help."

McAfee's Solanki said more user-defined policies will be on tap.

— Kelly Jackson Higgins, Senior Editor, Dark Reading

  • Cisco Systems Inc. (Nasdaq: CSCO)
  • Juniper Networks Inc. (Nasdaq: JNPR)
  • Microsoft Corp. (Nasdaq: MSFT)
  • McAfee Inc. (NYSE: MFE)
  • Trusted Computing Group Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    Sodinokibi Ransomware: Where Attackers' Money Goes
    Kelly Sheridan, Staff Editor, Dark Reading,  10/15/2019
    Data Privacy Protections for the Most Vulnerable -- Children
    Dimitri Sirota, Founder & CEO of BigID,  10/17/2019
    Register for Dark Reading Newsletters
    White Papers
    Current Issue
    7 Threats & Disruptive Forces Changing the Face of Cybersecurity
    This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
    Flash Poll
    2019 Online Malware and Threats
    2019 Online Malware and Threats
    As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    PUBLISHED: 2019-10-18
    In the Linux kernel before 5.3.4, a reference count usage error in the fib6_rule_suppress() function in the fib6 suppression feature of net/ipv6/fib6_rules.c, when handling the FIB_LOOKUP_NOREF flag, can be exploited by a local attacker to corrupt memory, aka CID-ca7a03c41753.
    PUBLISHED: 2019-10-18
    In xsltCopyText in transform.c in libxslt 1.1.33, a pointer variable isn't reset under certain circumstances. If the relevant memory area happened to be freed and reused in a certain way, a bounds check could fail and memory outside a buffer could be written to, or uninitialized data could be disclo...
    PUBLISHED: 2019-10-18
    HCL Traveler versions 9.x and earlier are susceptible to cross-site scripting attacks. On the Problem Report page of the Traveler servlet pages, there is a field to specify a file attachment to provide additional problem details. An invalid file name returns an error message that includes the entere...
    PUBLISHED: 2019-10-18
    In Horner Automation Cscape 9.90 and prior, improper validation of data may cause the system to write outside the intended buffer area, which may allow arbitrary code execution.
    PUBLISHED: 2019-10-18
    In Horner Automation Cscape 9.90 and prior, an improper input validation vulnerability has been identified that may be exploited by processing files lacking user input validation. This may allow an attacker to access information and remotely execute arbitrary code.