Comply to Connect (C2C)

Source: DVIDS, https://www.dvidshub.net/image/5011687/connected
Source: DVIDS, https://www.dvidshub.net/image/5011687/connected

Presented: March 10, 2017 12:00 pm (ET)
Presented by: Tony Gillespie

The challenging era of the Joint Information Environment (JIE) and Internet of Things (IoT) will require increased situational awareness and better control over the traffic flowing across networks. This webinar will describe Comply to Connect (C2C), an automated Network Access Control (NAC) solution that verifies that an endpoint is authorized and meets security requirements before allowing access to the network (i.e. improving mission assurance; increased SA/traffic awareness in JIE; & risk mitigation). These solutions take a standards-based approach to security and the goal is to always know what devices are on your network and to control what resources they can access. The C2C solution helps to mitigate existing risks, such as:

  • Propagation of malware that can lead to data exfiltration, network outages, or denial of service
  • Unauthorized people accessing information by using authorized devices
  • Authorized personnel using unauthorized devices, such as, personal laptops or tablets

 

Computer Icon

Host a Webinar with CSIAC

Are you interested in delivering a webinar presentation on your DoD research and engineering efforts?

Want to find out more about this topic?

Request a FREE Technical Inquiry!