Digital certificates- the most important NAC feature explained

Category: network access control / Date: 20 February 2020

When talking about Network Access Control, we often mention digital certificates. When entering a company network, they’re like the passport that proofs you’re a trusted user using a trusted device.…

Read the article

Remote workers- drop your VPN or we’ll shoot!

Category: network access control, VPN / Date: 11 July 2019

Now that so many employees work from home or another location that isn’t the office, the call for safe remote connections increases. Often, companies choose the well-known VPN to fulfil this need.…

Read the article

The short but solid guide to protecting your company Wi-Fi

Category: network access control / Date: 29 May 2019

In our last two blogs, we talked about WPA2 Personal, WPA2 Enterprise and additional measures you can take to secure your company Wi-Fi. The story made sense and the circle seems complete. But then…

Read the article

Scary Wi-Fi: the power of WPA2-Enterprise (if you do it right)

Category: network access control / Date: 16 May 2019

In our previous blog, we discussed the disadvantages of securing a company network with WPA2-Personal. We also promised that we’d come up with an alternative that’s much more suited for company…

Read the article

Scary Wi-Fi: the danger of WPA2-Personal (because no: it’s not safe)

Category: IT Security, network access control / Date: 2 May 2019

Quite some SMEs manage their Wi-Fi as if they’re at home. The connection is unprotected, easy-to-guess passwords are written down on post-its and are shared with everyone asking for access. But while…

Read the article

Head in the Cloud, feet on the ground: the future of NAC

Category: IT Security, network access control / Date: 18 April 2019

If we are to believe practically everyone around us, we’re doomed to fail unless we take all of our belongings to the Cloud. There, we can store and analyse data, exchange it with others and build…

Read the article

A no-nonsense guide to inline and port-based NAC differences

Category: network access control / Date: 4 April 2019

On any given day, there are a lot of knocks on your IT network door. So far in other blogs, we’ve talked about the pressures IT managers face to secure their network in times of BYOD policies, IoT…

Read the article

Safe or sorry? The place of access control in your security solution

Category: network access control / Date: 21 March 2019

The status quo in IT security is focused on detection. Virus scanners and network analysers control traffic on the network or chase down the bad guys. That worked well in the past, when people,…

Read the article

Back to the Future: why revisit Network Access Control?

Category: IT Security, network access control / Date: 6 March 2019

Imagine a little pesky piece of malware. There it is trying to get into your system. It can come in from anywhere; an employee bringing their own device, from the need to share Big Data, from…

Read the article

What’s an IT manager to do with BYOD policies?

Category: network access control, BYOD / Date: 21 February 2019

Things have been quiet around the IT department lately. The days of “fix my PC” and “my laptop won’t start” are officially over. Thanks to Bring Your Own Device (BYOD) policies, employees are more…

Read the article
Page 1 of 1