Trusted End-System Solution: "The Network-Based Trusted End-System solution complements the agent-based approach. It does not require a security agent to reside on each connecting device, making it particularly useful for organizations such as universities that often cannot control the number or type of end systems accessing the network. Once again, NetSight Atlas Policy Manager defines the end-system security requirements. When a user or device first attempts to connect to the network, its credentials are passed to an Authentication Server while the end system is scanned using vulnerability assessment and operating system patch assessment tools. This process is used to determine if that device meets the requirements for a trusted end system."—enterasys
Wednesday, January 26, 2005
About Me
- Name: Charlie
- Location: Austin, Texas, United States
Hi, I'm Charlie Wood. I'm the founder and former CEO of Spanning (acquired by EMC), a married father of two, a native Texan and Austinite, and the oldest guy in most of my classes at UT, where I'm adding an economics major to my computer science degree.
For more about my re-entry into academic life, read this blog's inaugural post.
Subscribe
Previous Posts
- Cisco's Secret Software Strategy: "Then there's th...
- Plugging the holes in porous university networks: ...
- MS AntiSpyware bites BitDefender: "A trial version...
- SonicWALL Debuts World's First Sub-$400 Gateway An...
- Brian Hook on the ActiveX Experience: "Brian Hook ...
- AlterPoint Addresses Compliance, Security: "To kee...
- Fried By Spyware: "How much of a nuisance is the p...
- Nokia to launch all-in-one enterprise VPN solution...
- Check Point Unveils Connectra 2.0, Introduces Indu...
- Symantec's Schwarz on Microsoft's Antispyware: "Th...
<< Home