家中等职业教育改革发展示范学校概述(PPT 44页)
家中等职业教育改革发展示范学校概述(PPT 44页)内容简介
Agenda
Business Needs Drive Security Adoption
The Traditional Approach to Network Security Isn’t Enough
The Problem NAC Should Address
The Cost
The Numbers Tell the Story
The Problem is Expected to Get Worse
NAC Market Expectations
Increasing Number of Targets to Protect
Key Elements of NAC Solutions
Common NAC Elements
Identify - Find/Authenticate New Devices
Identify - Pros & Cons of Various Approaches
Identify - Pros & Cons of Various Approaches cont.
Assess
Assess Endpoint Integrity
Assess Endpoint Integrity cont.
Monitor
Monitoring Post Network Entry
Traditional Approach to Network Security
Exploiting the Network’s Weakness
Monitoring Approaches
Mitigate
Mitigation Approaches for NAC
Quarantine Approaches
Quarantine Approaches cont.
Today’s NAC Landscape
Summary
About Mirage
Background & Key Accomplishments
Mirage Networks Management Team
Mirage Board of Directors/Investors
Strategic Partners
Selected Customers
Mirage Networks Endpoint Control
Behavioral Rules Example:Threat Propagation
Attack Deception
Mirage NAC is the Answer
Thank You
..............................
Business Needs Drive Security Adoption
The Traditional Approach to Network Security Isn’t Enough
The Problem NAC Should Address
The Cost
The Numbers Tell the Story
The Problem is Expected to Get Worse
NAC Market Expectations
Increasing Number of Targets to Protect
Key Elements of NAC Solutions
Common NAC Elements
Identify - Find/Authenticate New Devices
Identify - Pros & Cons of Various Approaches
Identify - Pros & Cons of Various Approaches cont.
Assess
Assess Endpoint Integrity
Assess Endpoint Integrity cont.
Monitor
Monitoring Post Network Entry
Traditional Approach to Network Security
Exploiting the Network’s Weakness
Monitoring Approaches
Mitigate
Mitigation Approaches for NAC
Quarantine Approaches
Quarantine Approaches cont.
Today’s NAC Landscape
Summary
About Mirage
Background & Key Accomplishments
Mirage Networks Management Team
Mirage Board of Directors/Investors
Strategic Partners
Selected Customers
Mirage Networks Endpoint Control
Behavioral Rules Example:Threat Propagation
Attack Deception
Mirage NAC is the Answer
Thank You
..............................
用户登陆
发展战略热门资料
发展战略相关下载