Deploying Network Access Quarantine Control (part 1 of 2) | |
From: | Joe Klemmer |
Date: | Sat, 14 Aug 2004 10:23:35 -0400 |
Deploying Network Access Quarantine Control (part 1 of 2) by Jonathan Hassell last updated August 4, 2004 One of the easiest and arguably most prevalent ways for nefarious software or Internet users to creep onto your network is not through holes in your firewall, or brute force password attacks, or anything else that might occur at your corporate headquarters or campus. It's through your mobile users, when they try to connect to your business network while on the road. http://www.securityfocus.com/infocus/1794