Mailinglist Archive


Deploying Network Access Quarantine Control (part 1 of 2)
From:Joe Klemmer
Date: Sat, 14 Aug 2004 10:23:35 -0400

Deploying Network Access Quarantine Control (part 1 of 2)
by Jonathan Hassell
last updated August 4, 2004 

One of the easiest and arguably most prevalent ways for nefarious
software or Internet users to creep onto your network is not through
holes in your firewall, or brute force password attacks, or anything
else that might occur at your corporate headquarters or campus. It's
through your mobile users, when they try to connect to your business
network while on the road.

http://www.securityfocus.com/infocus/1794