Tackling the Top Five Network Access Control Challenges

Numerous factors are driving enterprises to control who's admitted to the corporate network and what resources-servers, applications, stored data-they're allowed to access. Business trends such as mobility, outsourcing and the blurring of corporate network boundaries mean enterprises must provide network and application access. IT must open the network to a dynamic workforce, while at the same time protecting critical assets from the vulnerabilities that openness and user mobility bring.

In this document we explore five common networking challenges that enterprises face-network protection, guest user access, network visibility and monitoring, application access control, and identity-based Quality of Service (QoS)-and discuss how UAC can be used to address each.

Juniper | Application Security
©1994-2014 Infoworld, Inc.