Premium Content

Access "NAC technology evolves in a BYOD policy world"

Amy Larsen DeCarlo Published: 06 Dec 2012

Network Access Control (NAC) technology seemed all but dead a year ago. After dominating network security headlines for years, the technology eventually fizzled when users found that its features just didn’t go deep enough. But enterprise IT consumerization—specifically the need to better control access for personal devices on the corporate network—is resurrecting the need for better NAC solutions. Though it is difficult to quantify what percentage of organizations today allow users to access the network using personal devices, a recent survey by mobile service provider iPass, shows 91% of workers conduct business from their own smart phones. To enable these users, companies are finding themselves seeking ways to protect an environment that is more virtual and therefore more porous. Since NAC technology has always promised to merge authentication, end point security and access policy enforcement, it could be just the solution for these new protection needs. A broad spectrum of vendors is now promising new NAC features meant to handle a bring your own device ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features
    • Is virtual desktop infrastructure the answer? by Nathan Eddy

      IT organizations are finding that virtual desktop infrastructure is ready-made to take on the biggest BYOD challenge—providing secure, remote access to corporate assets.

    • Networking for BYOD: No single solution by Rivka Gewirtz Little

      An architecture firm IT manager finds himself mitigating the risks of BYOD after he realizes there is no easy answer to managing and securing personal devices on the network.

    • NAC technology evolves in a BYOD policy world by Amy Larsen DeCarlo

      Just when we thought NAC had fizzled, the technology may make a comeback as IT managers seek news ways of controlling personal mobile device access to corporate networks.

    • Mobile device security best practices for BYOD by Lisa Sampson, Feature Writer

      BYOD policies require a new set of mobile device security best practices. Instead of thinking, “Block access,” network managers must now think, “Enable access safely."

More Premium Content Accessible For Free

  • Mobile devices are gobbling up your WLAN bandwidth: Here’s how to cope
    handle_mobile_device.png
    E-Handbook

    More -- and more complex -- mobile devices are jumping on your enterprise network, gobbling up bandwidth from the WLAN infrastructure. This technical...

  • Finally! APM vendors design tools with networking pros in mind
    net_evo_0414.png
    E-Zine

    Whenever users complain about an application being slow, the network is always first to be blamed. And yet network engineers often have limited ...

  • Next-generation WLAN: How IEEE 802.11ac will change your network
    next-gen_WLAN.png
    E-Handbook

    Just five years ago, no one would have described Wi-Fi as a primary access technology but now, as Wi-Fi and cellular architectures deliver security, ...