Network access control solutions enable organizations to implement policies for controlling device and user access to corporate networks. Such policies may be based on device authentication, endpoint configuration or user role/identity. NAC also includes postconnect policies for monitoring the security state of endpoints and for implementation of remediation. NAC can be used to isolate Internet of Things devices and other nonstandard endpoints at the network switch or the wireless infrastructure.
Select a vendor to view user ratings and reviews.