Best Practice Report

Overcoming The Common Pitfalls Of NAC

How To Successfully Plan, Assess, And Implement Network Access Control

April 23rd, 2008
RI
Robert Whiteley III
With contributors:
Christine Atwood , Natalie Lambert , Rachel Dines

Summary

Network access control (NAC) is one of the hottest, yet vexing, technologies on the 2008 security agenda. As a network manager, you're eager to deploy it and mitigate risk by segmenting users and baking compliance checks directly into your network. Early adopters at peer organizations suffered from cost and complexity issues, but fortunately the technology has matured and we now see that a quarter of enterprises are fully up and running. NAC is still an evolving technology, however, with complexities that need to be managed. How do you make NAC successful? You should: 1) build a business case based on securing guest and employee access; 2) identify and prioritize all the relevant scenarios, which requires collaborating with your security colleagues; 3) kick off a three-stage deployment process with escalating enforcement actions; and 4) avoid common implementation mistakes like choosing products that lack rich identity capabilities.

Want to read the full report?

Contact us to become a client

This report is available for individual purchase ($1495).

Forrester helps business and technology leaders use customer obsession to accelerate growth. That means empowering you to put the customer at the center of everything you do: your leadership strategy, and operations. Becoming a customer-obsessed organization requires change — it requires being bold. We give business and technology leaders the confidence to put bold into action, shaping and guiding how to navigate today's unprecedented change in order to succeed.