Juniper Unified Access Control
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Juniper UAC mixes user identity, device security state, and network location information to create unique access control policy, per user and per session. UAC scored high in virtually every category, but was exceptionally strong in its policy-based network access control and its enforcement options. Last year, UAC finished second among readers.
Cisco NAC Appliance
The Cisco NAC Appliance is designed to be the first point of contact for users entering a corporate network, and enables administrators to authenticate and authorize users and enforce organizational security policies before network access is granted. Readers praised its integration with existing infrastructure and its vendor service and support.
Symantec Network Access Control
Symantec NAC controls access to corporate networks, enforces endpoint security policy and easily integrates with existing network infrastructures. Regardless of how endpoints connect to the network, Symantec evaluates endpoint compliance status, provisions the appropriate network access and provides automated remediation capabilities. Readers ranked Symantec high in scalability as well as praising the ease with which one can install, configure and administer the product.
"NAC hasn't struggled anymore than any other overhyped technology at the beginning of its buying curve. Right now, we're in the over-committing phase of the technology. In the last year, vendors have been coming together and come up with a plan for interoperability, and Microsoft is leading that. We've seen Microsoft's investment in NAC with Vista." -- Joel Snyder, senior partner, Opus1
2009 READERS' CHOICE AWARDS
Introduction and Methodology
Best Antimalware Products
Best Application Security Products
Best Authentication Products
Best Data Loss Prevention Products
Best Email Security Products
Best Identity and Access Management Products
Best Intrusion Detection and Prevention Products
Best Mobile Data Security Products
Best Network Access Control Products
Best Network Firewalls
Best Risk and Policy Management Products
Best Secure Remote Access Products
Best Security Information and Event Management Products
Best Unified Threat Management Products
Best Vulnerability Management Products
Best Web Security Gateway Products
Best Wireless Security Products