What is Network Access Control (NAC)?

The Network Access Control (NAC) /802.1x has the objective to ensure that all the devices connected to the corporate networks address the security policies established by the organization to avoid any kind of threats: virus entrance, spyware, malware, logs removal, information leak, etc.

The BYOD (Bring Your Own Device) trend where employees, partners and even customers use their own devices (smartphones, tablets, laptops) to gain access to corporate network resources is increasing NAC (Network Access Technologies) with the objective to authenticate devices as well as users.

We can distinguish several phases:

  • Detection: is the detection of the physical or wireless attempt of connection to the corporate network resources with the recognition of the authorized or unauthorized device/user.
  • Compliance: is the verification process that the device addresses with the established security policies like: device id, user, location, updated antivirus. If conditions are not meet, the connection attempt could be denied or there could be a forwarding to a quarantine portal.
  • Remediation: is the logic modification of the device requisites that is attempting to connect to the corporate network resources.
  • Acceptance: is the connection to the corporate network resources as defined by the user profile stored in the directory service.
  • Persistence: is the continuous monitoring of the connection/session to avoid any change in the assigned security policies.




Este sitio web utiliza cookies para que usted tenga la mejor experiencia de usuario. Si continúa navegando está dando su consentimiento para la aceptación de las mencionadas cookies y la aceptación de nuestra política de cookies, haga clic el enlace para mayor información.

Aviso de cookies