bradfordnetworks asked:

The IEEE 802.1X standard provides a means to validate the identity of endpoint devices and users prior to allowing connection to the network — an important step in securing network access. But that’s where it ends. Several other important aspects of securing network access — including security posture checking, device profiling and granular policy enforcement — are beyond the scope of 802.1X. So relying on 802.1X alone for Network Access Control (NAC) can leave your network exposed to serious security threats. Whether or not you’ve already deployed 802.1X in your network, learn more about what you can do to enhance network security with a comprehensive NAC solution. In this live webinar, Bradford Networks Co-Founder and CTO Frank Andrus will: * Explain key elements of the 802.1X standard, and where it leaves off from fully securing your network * Explore common challenges of deploying 802.1X, particularly in wired LAN environments * Discuss how an advanced NAC solution can augment — or even substitute for — deploying 802.1X * Review best practices for NAC as it relates to 802.1X.

Tagged with →  
Share →

Leave a Reply

Your email address will not be published. Required fields are marked *

Looking for something?

Use the form below to search the site:

Still not finding what you're looking for? Drop us a note so we can take care of it!

Set your Twitter account name in your settings to use the TwitterBar Section.