Feeds

Microsoft and Cisco collaborate on security

Giants team on giant white paper

The essential guide to IT transformation

Microsoft and Cisco Systems have detailed plans for interoperability between systems designed to enforce security policies on Windows PCs and servers.

The giants have published a white paper and detailed a roadmap that will enable Microsoft's Network Access Protection (NAP) and Cisco's Network Admission Control (NAC) to work together, to the benefit of users and developers.

Microsoft said the white paper describes the architecture and provides details for integrating the embedded security capabilities of Cisco's network infrastructure with capabilities planned in Windows Vista and Windows Longhorn Server. Under the roadmap, a limited beta program for interoperability between NAP and NAC will begin later this year. Microsoft said interoperability would be possible with the launch of Windows Longhorn Sever is in the second half of 2007.

The goal is to provide single sign-on to a network for machines running Longhorn Server and Windows Vista, and to give third parties building applications with a security component the simplicity of a single programming interface. Interoperability will also mean customers can deploy Cisco's NAC now and upgrade to NAP once Windows Longhorn Server ships, Microsoft said.

Cisco and Microsoft unveiled their plan in 2004. The idea was for two of the biggest companies in software and network equipment to collaborate on APIs and protocols, making their systems compatible. Microsoft was a relative newcomer to end-point security with NAP, which is designed to help administrators set security policies for network-attached Windows PCs and servers.

Anyone else underwhelmed by this arrangement/white paper?®

Next gen security for virtualised datacentres

More from The Register

next story
Snowden on NSA's MonsterMind TERROR: It may trigger cyberwar
Plus: Syria's internet going down? That was a US cock-up
Who needs hackers? 'Password1' opens a third of all biz doors
GPU-powered pen test yields more bad news about defences and passwords
e-Borders fiasco: Brits stung for £224m after US IT giant sues UK govt
Defeat to Raytheon branded 'catastrophic result'
Microsoft cries UNINSTALL in the wake of Blue Screens of Death™
Cache crash causes contained choloric calamity
Germany 'accidentally' snooped on John Kerry and Hillary Clinton
Dragnet surveillance picks up EVERYTHING, USA, m'kay?
Linux kernel devs made to finger their dongles before contributing code
Two-factor auth enabled for Kernel.org repositories
prev story

Whitepapers

5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.