In this paper, Enterprise Management Associates® (EMA™) analysts examine the fundamentals that yield an informed approach to selecting and deploying NAC. It presents how today’s approaches offer the means to identify and authenticate endpoint devices and offer a wide range of options for pre- and post-admission policy definition, enforcement and remediation that enable organizations to find the right balance of accessibility and security that best fits their needs.
The essentials of NAC functionality are described, along with key considerations for implementation that can produce more effective NAC results. Three enterprises that have adopted the ForeScout CounterACT solution are offered as examples of successful NAC deployments. They illustrate how comprehensive device discovery, real-time endpoint monitoring, flexible policy definition and effective control compatible with existing infrastructure answers many of the most critical requirements for guest management, endpoint compliance, mobile security and protecting sensitive information assets.