Story image

Never worry about device security policies again with an NAC

20 Nov 17

The impact of bring-your-own-device (BYOD) policies, Internet of Things (IoT), multiple user devices, and increased focus on employee experience is driving the need for network access control, an IDC report has found.  

The increase in connected devices represents more access points for security threats on the network.

At the end of the day, organisations bear the ultimate responsibility for securing their networks and data.

Securing individual external devices is tricky because there is a highly distributed and varied set of connected endpoints to manage.

As a result of the need to enforce consistent policies across all devices, employees, contractors and guests, many organisations are turning to network access control (NAC) as an answer.

IDC interviewed five organisations that use Aruba ClearPass as a policy management platform for network access control to understand the value and costs associated with its use.

ClearPass, which works in a multivendor setting, provides the ability to securely onboard a device, manage device enforcement rules, admit guest users, and perform endpoint health assessments, among other capabilities.

ClearPass customers reported that they achieve value by better controlling, securing, and providing access to their networks.

The whitepaper’s use cases provide valuable insights for organisations considering implementing NAC and are looking for qualitative and quantitative evidence on how it will impact their organisation. 

IDC found the business value gains customers reported included:

  • $12,036 value of IT staff time saved per 1,000 devices on networks
  • 60% faster network-access related incident response
  • 89% faster network onboarding
Survey reveals CX disconnect is risky business
Too much conversation and too little action could lead companies to neglect, lose, and repel their very lifeblood, according to Dimension Data.
Should AI technology determine the necessity for cyber attack responses?
Fujitsu has developed an AI that supposedly automatically determines whether action needs to be taken in response to a cyber attack.
Police making progress into Cryptopia breach
New Zealand Police say they are making ‘good progress’ into the investigation of an alleged cryptocurrency theft from Christchurch-based crypto exchange Cryptopia.
NEC concludes wireless transport SDN proof of concept
"Operation and management of 5G networks are very complicated and require automation and closed-loop control with timely data refinement and quick action."
Trend Micro’s telecom security solution certified as VMware-ready
Certification by VMware allows communications service providers who prefer or have already adopted VMware vCloud NFV to add network security services from Trend Micro.
Top cybersecurity threats of 2019 – Carbon Black
Carbon Black chief cybersecurity officer Tom Kellermann combines his thoughts with those of Carbon Black's threat analysts and security strategists.
Avaya introduces private cloud delivery of its UCaaS solution
Avaya is supposedly taking a flexible hybrid approach to the cloud with these new solutions.
Data growth the growing case for managed colocation
The relentless growth of data could see colocation take on a new importance, says Jon Lucas.