Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Applications
    • Applications
    • Cybersecurity
    • IT Management
    • Networking

    Network Access Control Market to Shift to ‘Layered Access Control’

    Written by

    Brian Prince
    Published December 3, 2010
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      A new report by Forrester Research predicts the network access control (NAC) market will increasingly shift to a new model called “layered access control.”

      In “Network Access Control Predictions: 2011 And Beyond,” the analyst firm describes a future where NAC encompasses not only the network, but also applications and mobile device access control.

      “Corporate may have a policy that you may access Facebook but you can’t access FarmVille,” explained Forrester analyst Usman Sindhu, co-author of the report. “NAC can enforce these policies and automate this rather than restricting access manually. On top of that development of APIs or XML, schemas like TNC IF-MAP can help connecting policy and enforcement from the network all the way up to the app layer.”

      The idea, the report states, is that the layered access control model will provide enforcement regardless of how users connect.

      “The consumerization of IT is a large, long-term trend,” said Gord Boyce, CEO of ForeScout. “Employees are bringing their own personal devices and applications into the workplace. This is bad for security, and it is causing security managers to look for products that can identify and control these unknown devices and applications.”

      In a survey in the report, Forrester found that many companies have a variety of NAC deployments. Thirty-eight percent of respondents, for example, employ NAC as part of a domain and identity-based bundle, essentially the same number as those who deploy it as part of a software-based bundle (36 percent) and a network security bundle (38 percent).

      “We have yet to find a customer that thinks only hardware or software is truly what they look for,” Sindhu said. “It’s often a combination, and customers don’t have any distinct choice here. They think network-based NAC is good for enforcement but software-based NAC is good for management. The data shows some trends on how consumers are implementing NAC. There is no pure-network or pure-endpoint NAC deployment. We see this continuing in the next year as well.”

      Sindhu predicts “modest growth” for the NAC market in 2011, with 10 percent of security organizations planning to adopt the technology in the next 12 months. The features most in demand for those interested in NAC are scanning virtual machine traffic, fixing client machines without user interaction, and discovering and tracking network-connected IP endpoints. Vendors are improving their portfolios to include these features, the analyst said.

      “For instance, discovering and tracking IP endpoints is coming up often,” he said. “It could be a compliance and audit requirement to show controls for the IP connected devices. Sometimes non-compute devices like IP phones could allow bypassing security controls, and thus they can pose serious issues to the network. Some of these features are [more] mature than others. But [the] appetite is slowly building.”

      Compliance requirements have become a driver of NAC adoption among enterprises, said Pamela Chang, a product manager at Symantec.

      “When enterprises need to maintain security and application configuration status at a higher level in order to meet compliance requirements, NAC technology can help enforce security and application compliance, as well as help automate remediation of compliance issues,” she said. “For example, if an employee on a laptop returns from vacation after few weeks and tries to connect to the corporate network and their virus definitions are out of date, we can check if that laptop is in compliance with corporate policy and remediate to update their virus definitions before letting the user back on the network.”

      Businesses thinking of NAC should not only think of restricting non-corporate assets or controlling guest users, Sindhu said.

      “They should make a strategy around what kind of users are accessing the network and how to give them access without violating corporate and regulatory compliance,” he said. “Today users have iPhones [and] iPads, and they use social media [and] Web 2.0. The NAC policies should go beyond just layer one and layer two, but look at these apps as well.”

      Brian Prince
      Brian Prince

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.