Moving Beyond 802.1X: A Checklist for Advanced Network Access Control

December 18, 2018

Network access control (NAC) depends on the ability to see what is connected, control user and device behavior, and automatically spot and mitigate threats. These goals are especially challenging when users try to connect their own devices to the network. This is further complicated with the rapid growth of Internet-of-Things (IoT) devices. The range of potential connected devices and systems includes everything from sensors to IP cameras to printers. This white paper describes the security limitations in the 802.1X authentication standard and identifies the capabilities to look for when designing a successful NAC solution: visibility, control, and automation. 

Previous Flipbook
How to Secure An ATM Network
How to Secure An ATM Network

Exposed, unattended, and geographically dispersed, automated teller machines (ATMs) are among a financial i...

Next Flipbook
Charting the Security K-12 School
Charting the Security K-12 School

The role of IT leaders in the K-12 environment is changing, from a technology focus to a more strategic foc...