Network Access Control: User and Device Authentication

Cover Image
Network access depends more and more upon wireless LANs and WANs, as well as virtual private network (VPN) remote access. All of these technologies have the potential to open the network perimeter to threats.

Read this white paper to learn more about:

  • The threat of viruses and worms
  • Additional controls to secure the enterprise network
  • Reducing the risk of exposure to attacks from malware
  • Ways to provide a robust computing environment to the enterprise
Vendor:
Intel Corporation
Posted:
Feb 8, 2021
Published:
Aug 1, 2005
Format:
PDF
Type:
White Paper

Download Your White Paper Now!