News Stay informed about the latest enterprise technology news and product updates.

Demand for BYOD access control leads to NAC resurgence

NAC technology is stepping up to the plate to give better BYOD access control to enterprises.

Network access control technology has come a long way from its days of being derided as an expensive and difficult tool that only succeeds in locking users out of the network. As the number of devices and the diversity of the users hitting networks across all industries grows, NAC security is becoming a must-have technology for any corporate environment.

Early generations of network-access control (NAC) products often overstated their abilities and underperformed, lowering customer confidence in the technology, said Lawrence Orans, research vice president for Stamford, Conn.-based Gartner Inc.

But NAC is making a comeback, said Brian Helman, director of its networking services for Salem State University in Massachusetts, and who presented a "Bring your own Everything" session at Interop 2014 in Las Vegas.

An IT professional from a university asked Helman if NAC was really worth the "cost or the frustration," noting that many of his end users -- the students -- had figured out ways to bypass his NAC system.

"NAC is kind of in the middle of resurgence, and it's worth it," Helman said. "We are talking about 16- to 21-year-old [students] doing things they shouldn't always be doing. I want to know who those people are."

Helman said his organization has been revisiting its NAC strategy, and is in the middle of switching NAC vendors.

Next-generation NAC technology walks the walk, offers BYOD access control

The question of whether the technology is worth deploying is unfortunately a common reaction for many organizations, said Scott Gordon, chief marketing officer for ForeScout Technologies. "A lot of folks have had a very tough time implementing NAC -- it involved an agent on each device and would often just lock out systems," he said. "Many organizations got burned by failed NAC implementations in the past."

"The old NAC is prehistoric -- it has a fraction of the capabilities that many solutions have now, so I'd imagine many [organizations] have been faced with users evading their NAC technology," said Steve Piper, CEO and co-founder of CyberEdge Group LLC., an Annapolis, Md.-based research and marketing consulting firm.

Although NAC proved to be expensive and complex in its early days, some vendors survived the blowback and matured their products, Gartner's Orans said.

Many NAC vendors are helping enterprises by evolving the scope of NAC functionality. Many next-gen NAC tools -- like Aruba Clearpass and ForeScout CounterACT -- are agentless, a great feature for bring your own device (BYOD) environments where IT struggles to deploy agents on employee-owned devices.

"There are still many managed devices on the network, but there are also many more mobile and personal devices that are largely unmanaged, so it's impossible to put agents on these devices," CyberEdge's Piper said.

In fact, BYOD and the increasing amount of transient devices on corporate networks complicated the enforcement of a traditional NAC policy, creating a need for a more modern approach to NAC..

The network access control policy of the Fashion Institute of Technology in New York City denies users from connecting their smartphones and tablets to the school's network; users must default to their cellular carriers. The school uses Aruba ClearPass to control access for student laptops. "[NAC] is critical to us in this case, because we obviously don't want to saturate our network with viruses and infected personal laptops that some students have," said Gregg Chottiner, vice president of IT and chief information officer for the Fashion Institute of Technology.

More on network access control policy and security

Deploying network access control tools

NAC policy: Handling smartphone access control

Integrating NAC tools and policies

ClearPass allows Chottiner and his team to get very granular control over network access by user or application. "If we wanted to, we could disable things like Facebook in a particular lab or classroom," he said.

Chottiner and his team manage the wireless network very closely because the organization's location is in the middle of the city. "If you're not a facility member or a student, you can't access the network," he said. "Even if a student tries to bring in a rogue access point from home, our controllers recognize it and shut down that port."

But organizations can run into problems with NAC if network SSIDs are being broadcasted, Chottiner said. "Some [organizations] don't manage access, but we have gone the other way and have chosen to lock it down. We've had faculty ask why they can't have the same access to wireless that they can get at a Starbucks. I don't want someone downloading things they shouldn't on our network," he said.

Next-gen NAC security integrates better into infrastructure

While NAC technology was historically deployed only within large enterprises, it has become necessary within small- to medium-sized environments, too. And it's becoming much easier for smaller IT teams to integrate next-generation NAC technology, and harder for users to circumvent these security measures.

Many modern agentless NAC strategies -- like ForeScout's -- can also adapt to an enterprise's infrastructure or even hosted security services more easily when compared to legacy NAC technology, which needed to touch every part of the infrastructure with agents to have enough visibility, ForeScout's Gordon said. "That level of interoperability negates the need to re-architect your infrastructure to satisfy a NAC deployment," he said.

Let us know what you think about the story; email: Gina Narcisi, news writer and follow @GeeNarcisi on Twitter.

Dig Deeper on Network Security Monitoring

Join the conversation


Send me notifications when other members comment.

Please create a username to comment.

How important is NAC to your business?
NAC is good at providing BYOD access control, and is one of the better control technologies out there as the article points out. Access is important, but also important is data security and device security and while NAC adds to that having data security is a must in BYOD situations. For that, it is interesting to see enterprise creating their own BYOD data security apps for their employees phones. Example, Tigertext now has a secure texting API called TigerConnect that companies are integrating into their own data security apps for SOX and HIPAA compliance, which I think is very telling in that companies are taking this option seriously. For more info: