InvestorsHub Logo
Followers 28
Posts 1761
Boards Moderated 1
Alias Born 07/24/2003

Re: None

Thursday, 08/28/2008 11:15:31 AM

Thursday, August 28, 2008 11:15:31 AM

Post# of 249195
NAC expected take a firm hold in business networks

Relevance? Wave's Embassy Endpoint Enforcer: http://www.wavesys.com/products/eee.asp

http://www.networkworld.com/newsletters/vpn/2008/082508nac2.html?hpg1=bn

NAC will take a firm hold in business networks within the next year, says Verizon Business.

The way the company looks at it, when businesses are comfortable with a technology, they are willing to outsource management of it to someone else. They’ve seen it with VPNs and they expect to see it soon with NAC. But right now, customers aren’t sure NAC meets their requirements or perhaps are unsure exactly what its capabilities are.

Whatever the case, they are just not at the point where they are willing to install the technology themselves and turn it over to someone else for management. But that day is getting closer and the working numbers for Verizon are 12 to 18 months.

The provider also sees Microsoft’s NAC products - which are called network access protection (NAP) - as getting ready to make a surge as well. Verizon sees little demand for NAP incorporated into the NAC managed service projects it has underway.


But Verizon expects that to change as more businesses deploy Windows XP Service Pack 3 or Vista, both of which include the NAP client, and the NAP server that is part of Windows Server 2008. While Microsoft NAP is scarce among its customers now, Verizon expects NAP to be a dominant component of its customers’ NAC deployments in a year.

Network Access Control (NAC) products started out as admission control managers that authenticated users and ensured their systems met security policy requirements before granting them access to the network. Today these products, typically dedicated appliances, can also manage users’ access once they’re already on the LAN to certain servers, applications, and data. Ensuring a user is who they say they are is typically performed by captive portals, MAC-based authentication, port-based authentication, or third-party authentication. Set policies dictate the level of access each user is granted, be it go/no-go access, VLAN-based access controls, simple packet filters, or stateful firewalling. Endpoint security assessments is done by running software on the user’s PC or device that reports status information back to a central policy server.

Compare products:

http://www.networkworld.com/buyersguides/guide.php?cat=866251

Join the InvestorsHub Community

Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.