Access your Pro+ Content below.
NAC technology evolves in a BYOD policy world
This article is part of the Network Evolution issue of April 2012 Vol. 3, No. 2
Network Access Control (NAC) technology seemed all but dead a year ago. After dominating network security headlines for years, the technology eventually fizzled when users found that its features just didn’t go deep enough. But enterprise IT consumerization—specifically the need to better control access for personal devices on the corporate network—is resurrecting the need for better NAC solutions. Though it is difficult to quantify what percentage of organizations today allow users to access the network using personal devices, a recent survey by mobile service provider iPass, shows 91% of workers conduct business from their own smart phones. To enable these users, companies are finding themselves seeking ways to protect an environment that is more virtual and therefore more porous. Since NAC technology has always promised to merge authentication, end point security and access policy enforcement, it could be just the solution for these new protection needs. A broad spectrum of vendors is now promising new NAC features meant to ...
Access this PRO+ Content for Free!
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Features in this issue
IT organizations are finding that virtual desktop infrastructure is ready-made to take on the biggest BYOD challenge—providing secure, remote access to corporate assets.
Just when we thought NAC had fizzled, the technology may make a comeback as IT managers seek news ways of controlling personal mobile device access to corporate networks.
An architecture firm IT manager finds himself mitigating the risks of BYOD after he realizes there is no easy answer to managing and securing personal devices on the network.
BYOD policies require a new set of mobile device security best practices. Instead of thinking, “Block access,” network managers must now think, “Enable access safely."
News in this issue
Next-generation firewalls have enjoyed a lot of hype in recent years, but now they are also dominating the market, according to Gartner’s latest firewall Magic Quadrant.
With the right strategy, mobile device security doesn't have to be a compromise between user demands and network risks.