Star 0

Abstract

Benjamin Czarny OPSWAT  download slides (PDF) Cisco, Microsoft and the Trusted Computing Group are battling to control the keys to locking untrusted endpoints out of networks. Whether you call the approach network access control, network admission control, network access protection, network node validation or trusted network connect, the premise is identical - systems should grant access to the network based on factors such as anti-malware protection level, personal firewall assessment, host and user authentication, location, and even time of day. This session will:

Slides