NAC security guide
This mini learning guide is a part of SearchSecurity.com’s multi-page guide, NAC security guide: How to achieve secure network access in the enterprise
Requires Free Membership to View
Before purchasing a NAC product, is it imperative that organizations have a clearly defined deployment plan as well as a network access control policy in place.
This SearchSecurity.com mini learning guide is composed of a variety of content, all discussing network access protection guidelines, including best practices for creating a network access control policy and NAC deployment.
Network
access control policy: Handling smartphone access control
It seems a new mobile device arrives on the scene nearly every weekday, and employees are
trying to connect them to the corporate network just minutes after they launch as quickly.
Smartphone access control can present problems for traditional network access control (NAC) products, so how can corporation manage network access from these devices and cope with the risks associated with them? In this tip, learn how to create a mobile network access control policy that covers the newest mobile devices and examines the role that network access control (NAC) systems play in the mobile environment.
Phased
NAC deployment for compliance and policy enforcement
Organizations need to prepare before purchasing a NAC product to meet compliance
requirements by having clearly defined policy and compliance requirements and ensuring its
infrastructure can support an NAC implementation, all preparation requirements that can require an
extensive effort, as well as costs.
This tip, which is a part of SearchSecurity.com’s com's Integration of Networking and Security School lesson, Using NAC to create a strong endpoint security strategy, offers a step-by-step NAC deployment process and explains how a NAC implementation can help with compliance and policy enforcement.
What
to consider when deploying NAC products
Deployment of
NAC products can be tricky. Some enterprises are capable of deploying and running network
access control (NAC) products with great success, while others experience serious deployment issues
and difficulties, causing some to scrap NAC technology altogether.
In this Q&A, network security expert Mike Chapple discusses how to achieve successful NAC deployment and outlines several items every organization should consider before beginning the deployment process.
This was first published in March 2012
Security Management Strategies for the CIO
Join the conversationComment
Share
Comments
Results
Contribute to the conversation