802.1x
Multi-Modal Wireless Security: Air, Users, and Data
Wireless networks are integral to most business’ computing infrastructures. The security on these networks needs to be planned with the utmost care. Unfortunately, we often see that the planning for air security is an afterthought. It shouldn’t be. And it’s not difficult to plan holistically for wir…
Access Control with Cisco TrustSec: Moving from “IP Addresses” to “Roles and Attributes”
Today’s enterprise is a highly dynamic, and hyper connected environment where IT plays a critical role in connecting the users, devices, resources and corporate IT systems. Today’s employees are also highly mobile in nature and do not necessarily have a single workspace assignment. The IT department…