Network Access Control

May 25, 2021

NETWORKING

If you can’t trust a MAC address, what can you trust?

3 min read

The concept of random and changing MAC addresses is not brand new, but is beginning to have a real impact on how network tools operate. The idea that operating system vendors are providing users with increasing privacy by making it harder for big corporations to track them is a double edged sword. How can networking tools continue to provide critical services such as network access control, guest and BYOD services in an environment where the identifier of the endpoint, the MAC address, is no longer stable.

May 24, 2021

SECURITY

TrustSec Policy Analytics – Part One: What are policy analytics?

4 min read

Cisco Secure Network Analytics' new TrustSec Analytics reports enable users to visualize group communications, validate policies, streamline policy violation investigations, and accelerate policy adoption efforts

July 20, 2018

SECURITY

Demystifying: Next-Generation Endpoint Security

5 min read

The term “next-generation” is used quite frequently across the tech industry – it’s not limited to security. Let's demystify the term and its value for endpoint security.

February 19, 2018

SECURITY

Have Your Cake and Eat it Too With Next-Generation Endpoint Security from Cisco

2 min read

When faced with an either/or situation, people typically prefer not to choose. We want the best of both worlds. Rarely does someone want peanut butter OR jelly. Have cake? You...

January 31, 2018

SECURITY

Are You Using Yesterday’s Tools to Stop Today’s Threats?

3 min read

Take a look around you. What’s the average age of the technology you see? Your cell phone is probably 2 years old at most. Your laptop may be slightly older....