Network Access Control

Expand all

The Risk

There is a growing demand from modern organizations to provide users with access to network resources on a variety of endpoints, including managed and personal mobile devices.  At the same time, organizations are phased with increasing security risks emanating from new malware and targeted threats, while governance requirements such as various compliance directives for asset integrity, protection, network segregation and data privacy become more and more demanding.  These conflicting forces, all bring Network Access Control (NAC) solutions to the forefront as an effective defense to the emerging communication risks, as well as a means of meeting compliance requirements. Admittedly it is the preferred solution by organizations who want to enforce organizational network security policies on all devices seeking network access including corporate LAN, WAN, remote access (VPN) and mobile devices.

NAC allows only compliant and trusted endpoint devices onto the network, restricting the access of non-compliant devices, and thereby limiting the potential damage from emerging security threats and risks. Moreover, it provides secure Guest Access to visitors, allowing them to stay in touch with their own companies without sacrificing the “host” organization’s security.

In today’s computing environments, organizations and network administrators are challenged with providing access to corporate resources for a growing user population. With the significant increase in the numbers and types of endpoints accessing their systems, organizations must have the ability to verify the security health and posture of endpoints, both prior to connecting to resources, and on a continuous basis after endpoints connect.

New generation NAC solutions have built-in intelligence to automatically detect non-interactive devices like printers and IP-phones and grant them network access according to their profile.  Additionally, these solutions have now incorporated user role-based security for authenticated users, as well.

Protecting your Organization

Our approach on Network Access Control (NAC) is assuring a successful deployment of leading NAC technologies that will safeguard your network and infrastructure.

We will help you design the security policies and the assignment groups, through analytic templates and meetings with the people responsible for NAC in your organization. In doing so, we will furnish you with recommendations and best-practice advice in order to help you build the security policies.

We will closely work with your network and system administrators and a small group of users in order to properly test and finalize the security policies to be enforced, as well as design and evaluate successful deployment scenarios.

At the deployment stage we can provide support to your organization and monitor the whole process towards eliminating failures and assuring a transparent installation. A set of scheduled and on demand reports will be designed and configured in order to meet compliance requirements and demonstrate the health status of the protected endpoints.

At the conclusion of the deployment phase of a NAC project our NAC experts may deliver to your administration personnel and a group of selected users, extensive training on the deployment, management and troubleshooting process.   On-going management of the NAC deployment is facilitated through a single enterprise level console.

Doing it right: Our Network Access Control Solutions’ Key Features and Benefits

Our Network Access Control solutions are largely characterized by the following Key Features and Benefits:

Key Features

Benefits

Monitoring security protection of endpoints

Enforcing endpoint security policies

Threat Containment

Different type of access based on Users’ role

Reduces loss of sensitive data

Access Control

Facilitates regulatory compliance with regulations such as PCI DSS, SOX and HIPAA

Asset Integrity

Compliance

Secure Guest Access

Devices Automatic Profiling

Asset Management

Operational Efficiency

 

Remaining Functional and Compliant – Support tailored to your needs

We very well understand that to remain effective, a Network Access Control deployment requires constant monitoring, fine-tuning, updating and maintenance.  These requirements may prove a burden your organization is not poised to undertake.  We have, therefore, structured our post-deployment services so that you may have the level of support you need, in order to achieve maximum return on your investment, with the least of worries.

Our suite of post-deployment services range from simple Maintenance and Support, to full-fledged Managed Security and Outsourcing Services.

This solution comprises part of the “Design & Implement” phase of our Information Security Continuum (D&I).