Home > Releases > Mirage Networks to Share NAC Insights at ISSA Security Leadership Conference

Mirage Networks to Share NAC Insights at ISSA Security Leadership Conference

October 25th, 2006

Mirage Networks(R), developers of award-winning Network Access Control (NAC) technology, will share technology insights at next week’s ISSA Secure San Diego conference to help organizations successfully secure and protect their mission-critical networks against threats created by unmanaged, out-of-policy and infected endpoints.

Legislation, new threats and interconnected networks continue to make the security professional´s task more difficult and daunting. Secure San Diego is a one-day leadership seminar produced by International Information Systems Security Certification Consortium (ISC)І and the Information Systems Security Association (ISSA) aimed at helping security professionals to manage the threats and issues they face today, as well as to prepare for those of tomorrow.

Peter Bybee, President and CEO of Network Vigilance and Chapter Vice President of the ISSA San Diego,, has lined up a list of leading security experts to speak at the event, including executives from Mirage Networks, Microsoft, SAIC, Webroot, SurfControl, the FBI along with several well-known independent IT security experts. Bybee will also be a featured presenter, leading a discussion on What You Should Include in Your Next IT Security Risk Assessment.

Mirage Networks’ CTO Grant Hartline, will lead a technical track entitled, “Using NAC to Secure the Lost Network Perimeter,” on Thursday, November 2 at 3:05 p.m. PT. Hartline will discuss the blurred line between perimeter and interior access security. Specifically, he will address the challenges created by mobile computing and access, compliance initiatives and malware. Finally, he will share how Network Access Control (NAC) can successfully address these challenges by meeting minimum requirements such as being full-cycle, LAN-based and offering deployment flexibility.

Releases

Comments are closed.