Network Access ControlThis newsletter is sponsored by Meru NetworksNetwork World's Network Access Control Newsletter, 08/02/07The all-in-one approach to NACBy Tim GreeneNetwork World has tested 13 NAC products that consist of a single devices that check endpoints, authenticate users and enforce the policies. The tests reveal differences among the products in several different areas. For instance, they evaluate the authentication methods each product supports and how it handles authorization. The tests also measure just how much information the endpoint screening reveals and whether it requires a client.
The test evaluates how the devices enforce policies and also the management platforms that are used to set the policies. Particularly useful is a quick guide to choosing the stand-alone NAC gear that bests suits particular customers. Briefly summarized here are six tips: 1. Before actually shopping for gear, prioritize what is most important: authentication, endpoint security, access control and management. 2. Don’t be scared off by whether these inline devices will actually slow down network performance. Instead, specify in RFPs what performance you need and have vendors meet those requirements. 3. Decide whether endpoint evaluation or post-admission behavior screening is more important to help sort out which products best suit individual needs. 4. Keep your mind open about NAC client software. It may be one more thing to maintain, but the tradeoff may be worth it. And be sure to check how each vendor’s NAC gear works with Microsoft’s Vista NAC client. 5. Carefully evaluate the management system to make sure it alerts quickly when it encounters problems that interferes with end users. 6. Understand potential weaknesses in one-device NAC architectures and make sure they are worth the risk based on what protections you expect NAC to provide and the value of resources you hope to protect. Editor's Note: Starting Aug. 14, this newsletter will be renamed "Security: Network Access Control" to better reflect the focus of the newsletter. We thank you for reading Network World newsletters!
|
Contact the author: Tim Greene is a senior editor at Network World, covering network access control, virtual private networking gear, remote access, WAN acceleration and aspects of VoIP technology. You can reach him at tgreene@nww.com. This newsletter is sponsored by Meru NetworksARCHIVEArchive of the Network Access Control Newsletter. BONUS FEATUREIT PRODUCT RESEARCH AT YOUR FINGERTIPS Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details. PRINT SUBSCRIPTIONS AVAILABLE International subscribers, click here. SUBSCRIPTION SERVICESTo subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here. This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription. Advertising information: Write to Associate Publisher Online Susan Cardoza Network World, Inc., 118 Turnpike Road, Southborough, MA 01772 Copyright Network World, Inc., 2007 |
No comments:
Post a Comment