Today's security professionals are faced with the challenge of extending application and data access to an increasing mix of users, supporting mobile workers, and remaining compliant to corporate and regulatory compliance requirements. Thankfully, network access control (NAC) addresses many of these problems by segmenting network connectivity, quarantining users based on policy, and running compliance checks. However, over the past three years, many NAC implementations have failed due to insufficient planning and overall solution complexity. This means that organizations need a better understanding of how to adequately plan for their NAC deployment, starting with building the right business case and identifying the relevant access scenarios.