Your organization has a firewall to stop hackers, viruses, and malware at the network’s edge. A firewall is vital to safe network operation, but because it operates at the edge of your network, it can only protect you from threats coming from outside your network.
NAC devices, on the other hand, protect your network from threats originating on the inside. Unauthorized devices connected to your network make your organization vulnerable to malware, viruses, and even internal spying and data theft. This is what a NAC device is designed to prevent, whether the vulnerability is a LAN port in a lobby or conference room, or a wireless access point.
In this age of BYOD to work, it’s even more difficult for your network to know what devices should be blocked. Most of the time, BYOD users are employees, guests, or contractors who need access to certain network areas, but as non-corporate assets, they should be steered away from others. A NAC that works with your network infrastructure can easily address that concern.
The ideal NAC device helps you do the following:
1. Control who can connect to your network. It detects, alerts, and blocks unauthorized laptops, other network devices, and wireless access points.
2. Protect your network—find and fix vulnerabilities before they’re exploited.
3. Detect malware and quarantine infected assets.
4. Comply with requirements for GLBA, HIPAA, HITECH, PCI, ISO 27001, and other security and privacy standards.