Published: 09 April 2019
Summary
Network access control projects often start with device posture and access enforcement as objectives, but fail to reach their desired goals. Security and risk management leaders who break NAC implementations into three phases, with reasonable milestones, can speed implementation and achieve success.
Included in Full Research
- Phase 1: Governance and Discovery
- Preconnect Versus Postconnect Authentication
- Agent-Based or Agentless Device Profiling
- Phase 2: Authentication and Process
- Guilty-Until-Proven-Innocent Authentication Recommendation
- Innocent-Until-Proven-Guilty Authentication Recommendations
- Establishing Processes
- Phase 3: Policy and Operations
- Segregation of Authorized Versus Unauthorized Devices
- Guest Access Management
- Quarantine Devices
- Configuration Guides for Endpoints, Supplicants and Network Equipment
- Troubleshooting Guides for All Three Layers of Configuration: Endpoint, Network Devices and NAC Solutions
- Self-Service Solutions
- Sponsor Training