Evaluate Weigh the pros and cons of technologies, products and projects you are considering.

Best Network Access Control Products

Readers vote for the best NAC products, including appliance, software and infrastructure user and device network access policy creation, compliance, enforcement and remediation.

Juniper Unified Access Control
Juniper Networks

Juniper UAC mixes user identity, device security state, and network location information to create unique access control policy, per user and per session. UAC scored high in virtually every category, but was exceptionally strong in its policy-based network access control and its enforcement options. Last year, UAC finished second among readers.

Cisco NAC Appliance
Cisco Systems

The Cisco NAC Appliance is designed to be the first point of contact for users entering a corporate network, and enables administrators to authenticate and authorize users and enforce organizational security policies before network access is granted. Readers praised its integration with existing infrastructure and its vendor service and support.

Symantec Network Access Control

Symantec NAC controls access to corporate networks, enforces endpoint security policy and easily integrates with existing network infrastructures. Regardless of how endpoints connect to the network, Symantec evaluates endpoint compliance status, provisions the appropriate network access and provides automated remediation capabilities. Readers ranked Symantec high in scalability as well as praising the ease with which one can install, configure and administer the product.

"NAC hasn't struggled anymore than any other overhyped technology at the beginning of its buying curve. Right now, we're in the over-committing phase of the technology. In the last year, vendors have been coming together and come up with a plan for interoperability, and Microsoft is leading that. We've seen Microsoft's investment in NAC with Vista." -- Joel Snyder, senior partner, Opus1


  Introduction and Methodology
  Best Antimalware Products
  Best Application Security Products
  Best Authentication Products
  Best Data Loss Prevention Products
  Best Email Security Products
  Best Identity and Access Management Products
  Best Intrusion Detection and Prevention Products
  Best Mobile Data Security Products
  Best Network Access Control Products
  Best Network Firewalls
  Best Risk and Policy Management Products
  Best Secure Remote Access Products
  Best Security Information and Event Management Products
  Best Unified Threat Management Products
  Best Vulnerability Management Products
  Best Web Security Gateway Products
  Best Wireless Security Products

Dig Deeper on Network Access Control technologies

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.