Most organizations fail to stop interior network threats
Posted on 26 August 2008.
A survey by Opine Consulting revealed nearly half of the IT professionals who responded had endpoints connecting to their corporate networks without their knowledge. Yet compared to other security issues, 86 percent of respondents said controlling network access ranked as a high priority. The survey, commissioned by Mirage Networks, reported that network access control solutions are gaining traction vs. more perimeter security technologies to address the problem.

The survey analysis shows that IT departments of all sizes have serious concerns about controlling network access. Many respondents did not believe their organizations focused network access policies on the greatest areas of business risk.

A summary of the key findings from the study include:
  • 86 percent of respondents indicated that controlling network access was very important or important compared to other security issues
  • 45 percent of respondents were not confident or only somewhat confident they know of every endpoint that connects to their network
  • 43 percent are either unsure or do not believe their organization focuses their network access policies and controls on the greatest areas of business risks to their organization
  • For those respondents with plans to deploy Microsoft NAP, the most common security solutions to integrate with are NAC (69 percent) followed by intrusion detection/prevention (55 percent)
  • 87 percent of respondents indicated standards are important or very important in deploying a Network Access Control (NAC) solution
  • More than half of respondents (51 percent) are concerned about job loss in the case of a security breach on their network.
While Microsoft NAP deployments seem to be slowed by complexity and lack of Microsoft Vista adoption, another key finding of the survey indicates that NAC solutions are recognized by IT professionals as a complementary solution to NAP and may actually increase NAP adoption. Full-cycle NAC solutions offer coverage for non-Windows endpoints and provide ongoing threat detection that supplements Microsoft NAPís pre-admission checks.


How to keep your contactless payments secure

Posted on 19 September 2014.  |  Fraudsters can pickpocket a victimís financial data using low-cost electronics that can fit into a rucksack. Here are the top security threats you should be aware of if youíre using a RF-based card, along with our top safety tips to keep your payments secure.

Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.

Daily digest

Receive a daily digest of the latest security news.


Mon, Sep 22nd