Talk With an Expert

Authentication and Authorization: The Big Picture with IEEE 802.1X

Authentication and Authorization: The Big Picture with IEEE 802.1X (PDF, 1.90MB)Published: 21 Dec, 2001
Created by:
Arthur Fisher

In the enterprise, Auth-x will provide IT staff and network managers with the ability to tighten security by enabling improved, automated implementation of their security policy. Auth-x brings authentication and authorization down to a port level, enabling true privilege-based management of network services. When deployed on a large scale, Auth-x becomes an important moderator for Internet traffic. In fact, in a few years, it will be hard to picture the Internet with out it. Auth-x puts security managers in control.