Best Practice Report

Overcoming The Common Pitfalls Of NAC

How To Successfully Plan, Assess, And Implement Network Access Control

Robert Whiteley III
 and  three contributors
Apr 23, 2008

Summary

Network access control (NAC) is one of the hottest, yet vexing, technologies on the 2008 security agenda. As a network manager, you're eager to deploy it and mitigate risk by segmenting users and baking compliance checks directly into your network. Early adopters at peer organizations suffered from cost and complexity issues, but fortunately the technology has matured and we now see that a quarter of enterprises are fully up and running. NAC is still an evolving technology, however, with complexities that need to be managed. How do you make NAC successful? You should: 1) build a business case based on securing guest and employee access; 2) identify and prioritize all the relevant scenarios, which requires collaborating with your security colleagues; 3) kick off a three-stage deployment process with escalating enforcement actions; and 4) avoid common implementation mistakes like choosing products that lack rich identity capabilities.

Log in to continue reading
Client log in
Welcome back. Log in to your account to continue reading this research.
Become a client
Become a client today for these benefits:
  • Stay ahead of changing market and customer dynamics with the latest insights.
  • Partner with expert analysts to make progress on your top initiatives.
  • Get answers from trusted research using Izola, Forrester's genAI tool.
Purchase this report
This report is available for individual purchase ($1495).