Network Access Control

Network access control (NAC) has emerged as one of the most important network security technologies in recent years. By enforcing security policy at the point of network access, NAC helps organizations control who and what can connect to their network infrastructure.

How NAC Works

When a device attempts to connect to the network, the NAC system assesses its security posture — checking for up-to-date antivirus, current operating system patches, and other policy requirements. Devices that pass the assessment are granted access; devices that fail are quarantined or given limited access to a remediation network.

Deployment Considerations

NAC can be deployed at the network edge, at the distribution layer, or at the access layer. The right deployment model depends on your network architecture, the types of devices you need to control, and your policy enforcement requirements.

Related Content
The Definitive Guide to Network Security

9 checklists for securing your network.

IDPS Buyer’s Checklist

Questions to ask before purchasing an IDPS.