Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    NAC Attack: Todays Products Will Fail, Report Says

    Written by

    Brian Prince
    Published April 6, 2007
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Forrester Research analysts are urging corporations to prepare for a shift in the Network Access Control market in the years to come, as NAC vendors move toward new software-based tools that leverage endpoint technology to proactively manage risk.

      In a report titled “Client Management 2.0,” Forrester analysts Natalie Lambert and Robert Whiteley forecast the death of modern NAC products, which they say feature too much complexity and not enough interoperability. Operations management teams want a unified solution, Lambert said in an interview with eWEEK.

      “They feel they deploy tools to solve business problems but then find themselves with more solutions than they can handle,” she said. “They want to consolidate, but they arent seeing any compelling solutions that bring together the functionality they need.”

      The report also contends that many NAC products focus solely on compliance with security policies instead of the remediation problematic machines, and are not able to defend against newly emerging threats.

      In addition, the researchers stated that existing NAC systems often result in multiple policies being established to control the same processes.

      Lambert and Whiteleys answer to the situation is policy-based software technologies that manage risk by integrating endpoint security, access control, identity and risk management.

      They dub this new generation of client and network security products “proactive endpoint risk management,” or PERM.

      Proactive endpoint risk management benefits enterprises from both an operational and technical standpoint, Lambert said.

      Most firms, she said, are evolving their security teams to focus on risk and higher-level regulatory compliance issues, she said.

      As threat protection and systems compliance mature, they will get thrown over the fence to IT operations functions. She called it a mistake for NAC solutions to focus on the network operations team.

      “Network ops staffers typically dont focus on dynamic, policy-intensive tasks that require the management of tens of thousands of devices,” Lambert said. “We think that desktop operations—which has been working with policy-intensive security and management tools for years—is a much more suitable home for defining NAC policies.”

      From a technical perspective, its a more complete management solution, she added.

      “Securing an endpoint means managing its entire life cycle,” Lambert said. “But todays current NAC solutions dont focus on a complete life cycle. Instead, they specialize in either pre-admission scans or post-admission monitoring—some solutions [do] both—but dont focus on remediation.”

      Before PERM becomes a reality in the marketplace, however, Lambert foresees widespread product and vendor consolidation—a process she said has already begun, with vendors such as McAfee integrating traditional client security with information leak prevention and vulnerability management.

      For their part, several vendors said NAC products will change. However, not all said they would change in the way Forrester predicts.

      At Cisco, company officials said Forrester used too narrow a definition of a NAC product because it only includes a health check of an endpoint.

      Brendan OConnell, product marketing manager within Ciscos NAC unit, said many NAC providers focus solely on whether or not a computer has the latest anti-virus software, and he called that a “mental blind spot.”

      NAC, he continued, should be composed of four things: authentication, quarantine, posture assessment and remediation.

      “There are a lot of other NAC products out there that may have only a subset of those components,” OConnell said.

      /zimages/1/28571.gifIs NAC whack? Click here to read more.

      Contrary to the reports conclusion that the network needs to be de-emphasized, Cisco NAC Marketing Manager Irene Sandler said NAC has to be a network enforcement product—and that the network is where the bulk of the decision-making must lie.

      Microsoft executive Mike Schutz said policy has a home in the network, though he said NAC products will evolve beyond the network device-centric approach commonplace today.

      “Customers today deploy multiple point security products such as AV and patch management, but these products rely on the end user to keep these solutions running and up-to-date,” said Mike Schutz, director of security and access product management at Microsoft.

      “Its easy for users to fall out of compliance, and NAP [Network Access Protection] addresses this problem by pushing IT policy into the network.”

      Lambert, however, said firms should de-couple their network access policy from their network hardware.

      “This policy should then be mapped to the current security and management technologies that can do the heavy lifting and leave the enforcement to the network,” she said.

      In addition, she advocated realigning IT organizations so that those responsible for endpoint operations are security and IT ops professionals who know how best to create policy to secure and manage the environment.

      Check out eWEEK.coms Security Center for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEKs Security Watch blog.

      Brian Prince
      Brian Prince

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×