Scary Wi-Fi: the power of WPA2-Enterprise (if you do it right)

Category: network access control / Date: 16 May 2019

In our previous blog, we discussed the disadvantages of securing a company network with WPA2-Personal. We also promised that we’d come up with an…

Read article

Scary Wi-Fi: the danger of WPA2-Personal (because no: it’s not safe)

Category: IT Security, network access control / Date: 2 May 2019

Quite some SMEs manage their Wi-Fi as if they’re at home. The connection is unprotected, easy-to-guess passwords are written down on post-its and are…

Read article

Head in the Cloud, feet on the ground: the future of NAC

Category: IT Security, network access control / Date: 18 April 2019

If we are to believe practically everyone around us, we’re doomed to fail unless we take all of our belongings to the Cloud. There, we can store and…

Read article

A no-nonsense guide to inline and port-based NAC differences

Category: network access control / Date: 4 April 2019

On any given day, there are a lot of knocks on your IT network door. So far in other blogs, we’ve talked about the pressures IT managers face to…

Read article

Safe or sorry? The place of access control in your security solution

Category: network access control / Date: 21 March 2019

The status quo in IT security is focused on detection. Virus scanners and network analysers control traffic on the network or chase down the bad…

Read article

Back to the Future: why revisit Network Access Control?

Category: IT Security, network access control / Date: 6 March 2019

Imagine a little pesky piece of malware. There it is trying to get into your system. It can come in from anywhere; an employee bringing their own…

Read article

What’s an IT manager to do with BYOD policies?

Category: network access control, BYOD / Date: 21 February 2019

https://insights.solitonsystems.com/it-security/protect-your-company-with-network-access-security#imagine_a_world_without_passwordsThings have been…

Read article
Page 1 of 1
1

Leave a comment