Every day we are faced with security measures designed to control user access. Access limitations are imposed every time we enter a secure building, board a plane, or access our email inboxes. Most people don’t like going through access controls because it takes time and it can be cumbersome (like at the airport), but we are willing to cope with it because it makes us feel safer. This is part of the times we live in…
In the IT world, poor access control measures leave networks open to a myriad of malicious programs. The Mobility Revolution and Telecommuting have brought its own share of challenges that we are still learning to cope with; however, just like you don’t let a criminal with bad intentions into your house, IT should ensure that end-user devices possessing a risk to others, and to themselves, are identified and forbidden to access the network until they are corrected or alleviated from such dysfunction.
Cyber attacks may happen from the inside or trusted side of an organization; not necessarily because disgruntled employees; but because their computers may be manipulated or contain Trojan horse programs or their keystrokes are monitored allowing hackers to critical resources.
A piece of technology that can help address the challenges described above and improve overall security standing of an organization is called Network Admission Control (NAC). NAC enforces a security policy before granting end user devices access to a network and also can provide continuous monitoring of the health condition of such devices so that access to the organization resources can be stopped if the device’s health deteriorates over the course of the day.
There are basically three components in the NAC framework:
Dell PowerConnect and Force10 network switches meet the industry standards to serve as the Enforcer or Authenticator in a Network Admission Control architecture. Organizations aiming for enterprise-grade security and high degree of regulatory compliance should explore NAC for its corporate and remote office locations. Is your network taking the proper steps to prevent user devices from compromising your network security?
This blog is part of our IT planning made simple series – Over the next few weeks, Dell’s technologists like Jorge are sharing the latest industry trends and Dell solutions to help maximize your IT investments. Find out the latest IT Trends at Dell.com/business/itplanning