Managing integration and access privileges for ad hoc groups

11.05.2009

To keep pace with the fast changes, IT should look for network devices that provide more intelligent control. Such devices can dynamically query identity stores for role information, apply access policies that encompass applications and devices, and have those policies follow the user. Only the user edge of the LAN sees all traffic, and only a centralized policy that encompasses users and their roles, applications and devices can meet the challenges of provisioning – and deprovisioning – these ad hoc groups.