We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Statement.

Filter By:

Type

Topic

Recent Blogs & Podcasts

6 Results for: "Jennifer Minella"

 



June 5, 2018 | Network Access Controls (NAC)
By Jennifer Minella, IANS Faculty

 Choose the Right NAC Solution

The success of a NAC solution depends heavily on an organization's specific goals and network environment, but certain features can make or break an implementation. In this Ask-an-Expert written response, IANS Faculty Jennifer Minella compares products from four vendors - Aruba, Bradford, Cisco and ForeScout - across four key feature areas.

Read More »


April 12, 2017 | Network Access Controls (NAC)
By Jennifer Minella, IANS Faculty

 Deploying NAC for Both Wired and Wireless Networks

No two network access control (NAC) solutions are alike, and choosing the right implementation for a complex health care environment that spans both wired and wireless networks is difficult at best. In this Ask-an-Expert written response, IANS Faculty Jennifer Minella provides an overview of current NAC options along with some industry-specific recommendations.

Read More »


October 20, 2015 | Authentication
By Jennifer Minella, IANS Faculty

 Using 802.1x and Certificates for Device Authentication vs. Profiling

The use of certificates and profiling technologies are two popular ways for companies to identify various devices attempting to access their network. In this Ask-an-Expert written response, IANS Faculty Jennifer Minella offers a detailed examination of the pros and cons of using 802.1x certificates for device authentication and lists some of the major technologies to watch in the space, including IEEE 802.1x, TPM and MACSec.

Read More »


January 19, 2017 | Security Policies and Strategy
By Daniel Maloof, IANS Managing Editor

 IANS at RSA 2017: The CISO as a Change Agent

CISOs are constantly hearing all kinds of advice, counsel and silver bullets that are designed to help make their challenging position work more effectively. But where are these recommendations coming from? What if there was a way to distill the achievements of hundreds of successful CISOs down to a few, critically important techniques?

Read More »