vendor landscape: network access control

7
NAC is surging back. BYOD means more devices on your networks and more potential for problems. NAC is needed to provide increased visibility and increase control over access. Integration with other security components, such as MDM, SIEM, NGFWs and IDPS, are increasing the functionality of NAC while realizing a combined value across multiple products. Network access control (NAC) was created by Cisco as a concept in 2003, and as an actual capability in 2004. It has always been a tool to perform a pre- connect assessment of devices before allowing them access to the network and precious internal resources. Over the years, NAC has come to include more capabilities, such as continuous vulnerability assessment and intrusion prevention. NAS use settled down as the value of pre-connect assessment became muted for most, given the complexity of the required architecture and its impact on performance. The proliferation of personal devices created a renowned value for access control. Employers needed a way for personal devices not to be “guests” while also being centrally enforcing policies around access: NAC. NAC and MDM vendors began integrating their products to add peripheral security capabilities. A MDM presents the NAC solution with much greater visibility and information to define and edit access policies. Integration of peripheral security solutions is accelerating as the potential value realized from a connected security system becomes known. Several vendors provide bidirectional integrations so that NAC solutions can share data and create automated or controlled responses from these systems. The continued disruption in enterprise data centers though accelerated movement to virtualized platforms or cloud based platforms will change the scope of what a NAC solution must control. Data virtualization enables data pools to be dynamically delivered to applications allowing for data movement across devices and the network. NAC solutions will adapt through increased user and role

Upload: info-tech-research-group

Post on 20-Aug-2015

407 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Vendor Landscape: Network Access Control

NAC is surging back. BYOD means more devices on your networks and more potential for problems. NAC is needed to provide increased visibility and increase control over access. Integration with other security components, such as MDM, SIEM, NGFWs and IDPS, are increasing the functionality of NAC while realizing a combined value across multiple products. Network access control (NAC) was created by Cisco as a concept in 2003, and as an actual capability in 2004. It has always been a tool to perform a pre-connect assessment of devices before allowing them access to the network and precious internal resources. Over the years, NAC has come to include more capabilities, such as continuous vulnerability assessment and intrusion prevention.NAS use settled down as the value of pre-connect assessment became muted for most, given the complexity of the required architecture and its impact on performance. The proliferation of personal devices created a renowned value for access control. Employers needed a way for personal devices not to be “guests” while also being centrally enforcing policies around access: NAC.NAC and MDM vendors began integrating their products to add peripheral security capabilities. A MDM presents the NAC solution with much greater visibility and information to define and edit access policies. Integration of peripheral security solutions is accelerating as the potential value realized from a connected security system becomes known. Several vendors provide bidirectional integrations so that NAC solutions can share data and create automated or controlled responses from these systems. The continued disruption in enterprise data centers though accelerated movement to virtualized platforms or cloud based platforms will change the scope of what a NAC solution must control. Data virtualization enables data pools to be dynamically delivered to applications allowing for data movement across devices and the network. NAC solutions will adapt through increased user and role access being based a multitude of inputs.NAC usage is expected to grow within the near future. In the long term some NAC functions will become embedded within wired and wireless access methods and infrastructure which will provide downward pressure on pricing.

Page 2: Vendor Landscape: Network Access Control
Page 3: Vendor Landscape: Network Access Control
Page 4: Vendor Landscape: Network Access Control
Page 5: Vendor Landscape: Network Access Control
Page 6: Vendor Landscape: Network Access Control