Archive for the ‘Posts’ Category

The technological savvy and tenacity of cyber criminals has never been greater, and IT administrators trying to prepare for impending attacks are often left backpedaling. With all of the different ways a corporate network may be attacked, IT administrators must strive to implement a comprehensive remote access security framework within their enterprises.  Especially with the […]

Organizations tasked with safely connecting their employees to the corporate network are under pressure to not only accommodate various devices, but also offer multi-platform support. In fact, analysts predict  that through 2017, 90% of enterprises will have two or more mobile operating systems to manage! Adding to this pressure is the recent onslaught of Windows […]

As indicated by your feedback in several of our polls, and as highlighted at Interop New York, more and more users are opting to access their company network via various devices. Of all the devices involved in the BYOD movement, Apple iOS products are some of the most popular. In response to this demand, the […]

The following the first in a series of excerpts from NCP engineering‘s technical white paper, Automated Mobile Security:  Leveraging Trusted Network Connect (TNC) IF-MAP to provide automated security for company networks and mobile devices. The increasing use of mobile devices like smartphones and tablet PCs introduce new threats to enterprise IT networks. While most of the well known […]

Ben Ruset is systems administrator at Princeton University. He speaks to VPN Haus about pressing provisioning issues all organizations – academic or corporate – should consider.  VPN Haus: When dealing with employee terminations, who should own network provisioning – HR or IT? Ben Ruset: Typically HR should notify IT and request that an account needs […]