Search This Blog

Thursday, August 02, 2007

The all-in-one approach to NAC

Network World

Network Access Control




Network World's Network Access Control Newsletter, 08/02/07

The all-in-one approach to NAC

By Tim Greene

Network World has tested 13 NAC products that consist of a single devices that check endpoints, authenticate users and enforce the policies.

The tests reveal differences among the products in several different areas.

For instance, they evaluate the authentication methods each product supports and how it handles authorization. The tests also measure just how much information the endpoint screening reveals and whether it requires a client.

Manage Insider Security Threats

Experts say 75% of security threats come from inside your organization. Watch the latest Network World Editorial Perspectives Webcast today, "Security From the Inside," and learn which technologies and processes best protect your intellectual property and assets inside the perimeter.

Click Here to View

The test evaluates how the devices enforce policies and also the management platforms that are used to set the policies.

Particularly useful is a quick guide to choosing the stand-alone NAC gear that bests suits particular customers.

Briefly summarized here are six tips:

1. Before actually shopping for gear, prioritize what is most important: authentication, endpoint security, access control and management.

2. Don’t be scared off by whether these inline devices will actually slow down network performance. Instead, specify in RFPs what performance you need and have vendors meet those requirements.

3. Decide whether endpoint evaluation or post-admission behavior screening is more important to help sort out which products best suit individual needs.

4. Keep your mind open about NAC client software. It may be one more thing to maintain, but the tradeoff may be worth it. And be sure to check how each vendor’s NAC gear works with Microsoft’s Vista NAC client.

5. Carefully evaluate the management system to make sure it alerts quickly when it encounters problems that interferes with end users.

6. Understand potential weaknesses in one-device NAC architectures and make sure they are worth the risk based on what protections you expect NAC to provide and the value of resources you hope to protect.

Editor's Note: Starting Aug. 14, this newsletter will be renamed "Security: Network Access Control" to better reflect the focus of the newsletter. We thank you for reading Network World newsletters!


  What do you think?
Post a comment on this newsletter

TODAY'S MOST-READ STORIES:

1. IBM saves $250M with Linux-run mainframes
2. Nortel lands huge $300M VoIP win
3. Cisco muffles Linksys death knell
4. NAC alternatives hit the mark
5. Grid pays handsome dividends for HR firm
6. AT&T, IBM among winners of $50B federal deal
7. Online gamers' dirty little secrets exposed
8. IBM supercomputer more powerful than before
9. Hogwarts IT director quits
10. Apple iPhone battery complaints mounting

MOST-READ REVIEW:
NAC alternatives hit the mark


Contact the author:

Tim Greene is a senior editor at Network World, covering network access control, virtual private networking gear, remote access, WAN acceleration and aspects of VoIP technology. You can reach him at tgreene@nww.com.



ARCHIVE

Archive of the Network Access Control Newsletter.


BONUS FEATURE

IT PRODUCT RESEARCH AT YOUR FINGERTIPS

Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details.


PRINT SUBSCRIPTIONS AVAILABLE
You've got the technology snapshot of your choice delivered to your inbox each day. Extend your knowledge with a print subscription to the Network World newsweekly, Apply here today.

International subscribers, click here.


SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription.


Advertising information: Write to Associate Publisher Online Susan Cardoza

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772

Copyright Network World, Inc., 2007

No comments: