Mailinglist Archive
| Deploying Network Access Quarantine Control (part 1 of 2)
|
| From: | Joe Klemmer |
| Date: | Sat, 14 Aug 2004 10:23:35 -0400
|
Deploying Network Access Quarantine Control (part 1 of 2)
by Jonathan Hassell
last updated August 4, 2004
One of the easiest and arguably most prevalent ways for nefarious
software or Internet users to creep onto your network is not through
holes in your firewall, or brute force password attacks, or anything
else that might occur at your corporate headquarters or campus. It's
through your mobile users, when they try to connect to your business
network while on the road.
http://www.securityfocus.com/infocus/1794