Get Updates
Get notified of breaking news, exclusive insights, and must-see stories!

UAC provides endpoint security solutions

Hyderabad, Oct 11 (UNI) The recent theft of credit card data of clients by an employee of an IT company in the country has brought to focus the urgent need for preserving a high level of security, says IBM Security Management Products Business Manager Vikram Gidwani.

Over 50 to 70 per cent of the data of various companies are not secure in the present scenario to web-based threats, such as spyware, viruses, unauthorised access, among others, he revealed while addressing a conference on ''emerging Paradigms on Information Security'' here today as part of five city security series from Frost and Sullivan, a global growth Consulting company.

Mobile laptops and non-complaint desktops were susceptible to a myriad of internet threats. Yet they were allowed to access corporate network and business critical resources and applications, said Dr Madan Mohan, Director-Consulting, ICT Practice(India), Frost and Sullivan.

As access to network resources has grown ubiquitous, Unified Access Control(UAC) solutions solve the problem of balancing access and security controls by binding endpoint, identity and network information for dynamic policy management that was enforced in real-time throughout the network, he said, adding that enterprises had followed best of breed strategy for investment in security and this posed multiple challenges from security management perspectives. ''UAC network will help to mitigate such problems, he added.

Prasad Babu, Director Systems Engineering and Operation, Juniper Networks India said Juniper's UAC combined identity-based policy and end-point intelligence to give realtime visibility and policy control throughout the network. ''It is a cost-effective solution to the problem of unmanaged or ill-managed endpoint security throughout the LAN,'' he added.

Mr Babu said ''It also integrates seemlessly with existing security infrastructure. End-point assessment was done via the infranet agent, a lightweight agent that was dynamically provisioned by Infranet Controller and policy enforcement at key places in the network, using Juniper's firewall'', he added.

Giving the Enterprise perspective, Attorney of Cyber laws, Pawan Duggal through Video Conferencing highlighted the features of the Information Technology Act of 2000, enacted by the Centre to deal with the problem of hacking.

UNI SM KVV KR VC1705

Notifications
Settings
Clear Notifications
Notifications
Use the toggle to switch on notifications
  • Block for 8 hours
  • Block for 12 hours
  • Block for 24 hours
  • Don't block
Gender
Select your Gender
  • Male
  • Female
  • Others
Age
Select your Age Range
  • Under 18
  • 18 to 25
  • 26 to 35
  • 36 to 45
  • 45 to 55
  • 55+