NAC protection: Network access control policy, deployment guidelines

This SearchSecurity.com mini learning guide is composed of a variety of content, all discussing network access protection guidelines, including best practices for creating a network access control policy and NAC deployment.

NAC security guide

This mini learning guide is a part of SearchSecurity.com’s multi-page guide, NAC security guide: How to achieve

secure network access in the enterprise.

Before purchasing a NAC product, is it imperative that organizations have a clearly defined deployment plan as well as a network access control policy in place.

This SearchSecurity.com mini learning guide is composed of a variety of content, all discussing network access protection guidelines, including best practices for creating a network access control policy and NAC deployment.

Network access control policy: Handling smartphone access control
It seems a new mobile device arrives on the scene nearly every weekday, and employees are trying to connect them to the corporate network just minutes after they launch as quickly.

Smartphone access control can present problems for traditional network access control (NAC) products, so how can corporation manage network access from these devices and cope with the risks associated with them? In this tip, learn how to create a mobile network access control policy that covers the newest mobile devices and examines the role that network access control (NAC) systems play in the mobile environment.

Phased NAC deployment for compliance and policy enforcement
Organizations need to prepare before purchasing a NAC product to meet compliance requirements by having clearly defined policy and compliance requirements and ensuring its infrastructure can support an NAC implementation, all preparation requirements that can require an extensive effort, as well as costs.

This tip, which is a part of SearchSecurity.com’s com's Integration of Networking and Security School lesson, Using NAC to create a strong endpoint security strategy, offers a step-by-step NAC deployment process and explains how a NAC implementation can help with compliance and policy enforcement.

What to consider when deploying NAC products
Deployment of NAC products can be tricky. Some enterprises are capable of deploying and running network access control (NAC) products with great success, while others experience serious deployment issues and difficulties, causing some to scrap NAC technology altogether.

In this Q&A, network security expert Mike Chapple discusses how to achieve successful NAC deployment and outlines several items every organization should consider before beginning the deployment process.

This was first published in March 2012

Dig deeper on Network Access Control Basics

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close