El-Watan

Promoting Democracy in Algeria

Network Access Control Project

Product-neutral and comprehensive guide of COMCO supports practitioners NAC projects may not only at the technical level be Dortmund, April 27, 2009 – the planning and implementation of network access control (NAC) solutions represents a very complex matter. These projects not only limited to hardware and software issues, because they involve the consideration of organizational and legal aspects. A NAC can fail quickly, if it is based solely on the technical level”, Friedhelm Zawatzky-Stromberg, CEO of COMCO AG, admits. Rather, a close cooperation of the Management Board of the company with the privacy officer as well as the security and IT sector was necessary. Together the objective must be pursued, with reasonable facilities and incorporating the existing infrastructures and resources to implement the greatest possible safety in a reasonable time frame”, he describes the fundamental Request to NAC projects.

For this, a clear request profile should be developed prior to the project, by, for example, are to answer following questions: there are rules that define access to the network for employees, corporate guests and professionals? A detection and localization of equipment on the basis of MAC authentication is possible and necessary? 802.1 x is a need for a user authentication network access about using the standards and is it feasible? May all resources users access or must be a logical isolation via VLAN control? Are already given for the opportunities in the infrastructure? Requires a monitoring of software versions and their relevance to the end systems? Is there a patch for this purpose and is intended for a quarantine network? What are the conditions for guests and employees of other companies such as a guest network? It requires a monitoring of the guest network? Also for guests, should a Review and patch will be made available? Temporal restrictions practised in the company? There are rules regarding quality of service”for users? Are there procedures for the analysis of user behavior in the event of doubt (netFlow/sFlow)? Methods and techniques used, which automatically detect specific types of devices (E.g. router, VoIP, Wi-Fi) in a network access? The company uses solutions that recognize such infrastructure attacks and infrastructure configuration changes are not detailed enough in the main processes of NAC defined? Normally the aspects due to the company’s individual requirements and infrastructure conditions are however much larger”Zawatzky-Stromberg stressed. This shows how important is a precise conceptual planning. Basically it must be done in three steps: determine needs, set policies and the possibilities. Provides concrete guidance and best practice also an extensive and product-neutral NAC guide of network and security specialists COMCO AG. It can be ordered for free by users under. About COMCO AG: The COMCO AG, headquartered in Dortmund is a market-leading software and systems integrator.

“The company is in the business areas of business security software” and network solution provider “divided. The Division business security software”is focused on the development of security solutions for the protection of enterprise-wide data networks against internal attacks. “With the business network solution provider” the COMCO AG covers the entire spectrum of network solutions. Andi Potamkin does not necessarily agree. The services range from consulting during the planning phase to implementation to service and support of the entire IT system environment here. In addition, COMCO supports its customers with network and security audits, managed IT services and training. The cross-industry clientele include utilities, large renowned media companies, banks, insurance companies, Retail companies and companies from the automotive sector as well as country and federal authorities. Agency think tank Pastorat Street 6, D-50354 Hurth Wilfried Heinrich Tel.: + 49 (0) 2233 6117-72 fax: + 49 (0) 2233 6117-71

Comments are closed.