Explore the Market Guide for Network Access Control

Gartner Market Guide for Network Access Control, July 13, 2018
Download the newest Gartner report that discusses the NAC market, which they see as mature. The report includes these key drivers considered by clients when implementing a NAC solution:

  • Visibility into infrastructure-connected devices with the goal of implementing access policies. This includes commonly used devices (such as a workstation, laptop, printer, IP phone, IP camera, access points, and also IoT devices like OT devices, medical devices and building automation)

  • Manage access for contractors, consultants and different kinds of visitors to maintain visibility and limit access only to resources required according to each profile

  • Enable the implementation of a BYOD program, primarily wireless, to ensure that employees can use their equipment while maintaining a minimum of due diligence for access to corporate infrastructure

  • Analyze compliance with a minimum security posture at the endpoint. For example, verify that the endpoint has EPP installed, and most critical security patches are installed
Further, the report notes that security and risk management leaders responsible for network security should:

  • Select NAC solutions that are optimized to the size of their IT infrastructure. The NAC market is mature, and some vendors specialize in large environments, whereas others focus on small and midmarket organizations.

  • Implement NAC in multiple phases. Phase 1 typically provides network visibility. Phase 2 usually enables device and/or user authentication to the network. Phase 3 commonly allows more advanced policies, such as blocking noncompliant devices from the network, but is rarely being used by the majority of enterprises.
Download the report by completing the short form on the right.  

______________

*Gartner, Inc., Market Guide for Network Access Control, July 13, 2018, Claudio Neiva, Lawrence Orans. 
*GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally, and is used herein with permission. All rights reserved.   Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose

Download the report by completing this short form.