No Kindle device required. Download one of the Free Kindle apps to start reading Kindle books on your smartphone, tablet, and computer.
To get the free app, enter your e-mail address or mobile phone number.
Get on the fast track to NAC and keep your network safe
These days, when employees, partners, and guests want to access your network using laptops, mobile devices, and more, protecting your network takes on a new dimension. Network access control is the answer, and here's where you'll learn to make sense of it all. Discover how NAC works, implement a program, and prepare to take real-world challenges in stride!
Which one's for you? decide on the best NAC approach for your organization
AAA is not the auto club understand the essential functions of Authentication, Authorization, and Accounting
It's our policy determine which NAC policies are appropriate for your company
A delicate balance learn how to set policies that are enforceable and reasonable enough to be followed, yet still effective
Get 'em on board involve and motivate everyone whose support is critical to a successful implementation
Let's get techie become familiar with the architectures and standards involved
Be prepared know what to expect when you flip the switch
Open the book and find:
Key business drivers for deploying NAC
Steps for planning your implementation
Who needs to be involved
Ten best practices for NAC
Where enforcement should occur
The role of standards
How NAC works with other network components
Jay Kelley is Product Marketing Manager for Juniper Networks Unified Access Control solutions. Rich Campagna is Product Line Manager for Juniper Networks UAC and SSL VPN product families. Denzil Wessels is Technical Marketing Manager for Juniper Networks UAC and SSL VPN.