Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint Security: 6 Questions To Ask Before You Buy: Page 4 of 8

  • Next, you need to decide where on the network you intend to place the appliance, and what part of your enterprise computing resources you want to protect. Obviously, the more parts of your network that you want to protect, the more expensive the project becomes. Some appliances should be placed directly behind the corporate firewall, covering the entire network. Others are better positioned behind the distribution switch layer, or in front of critical servers, or deployed to protect particular subnets or departmental networks.

    The TNC architecture seems the most flexible of the three for widest deployment and protection scenarios. NAP is designed to protect Microsoft servers, and NAC is designed for Cisco network switches and routers.

    Some devices (such as Vernier, Consentry, and Nevis Networks) operate in-line, meaning that any network resources located behind them will be protected and only healthy network clients can pass through and gain access to these resources. Others (such as Mirage, Forescout, and AEP Networks) operate out of band and are typically connected via a network span port, watching over all of the network traffic on that particular subnet, and insert themselves into the network stream once a user has successfully authenticated themselves through an Active Directory or VPN login. Part of understanding where to place these devices is in understanding the relative throughput that each device will be able to handle passing through it. Some solutions are more limited and can't handle the higher throughputs of larger networks.

    Recommendations:

  • For larger-sized networks with higher throughput requirements, consider Juniper's endpoint solutions cover a wide range in throughput from 75 Mbps to 30 GBps.
  • Unsure of in-line or out of band? StillSecure and Symantec offer products that can work with both methods.

    4) Do you manage all of your desktops?