Written by Paul Campaniello on December 15, 2017
How to Overcome Network Access Control Limitations
Enterprise technology has changed. Work habits have changed. And the network perimeter has dissolved.
Network security must change to keep up with enterprise technology and work habits. This is causing a fundamental shift in network security. The difference is:
Network Access Control (NAC) Trusts Users Inherently
This trust model is designed to work inside the perimeter, yet Forrester says it is broken for four reasons:
- It's impossible to identify trusted interfaces
- The mantra "trust but verify" is inadequate
- Malicious insiders are often in positions of trust
- Trust doesn't apply to packets
Software-Defined Perimeter (SDP) Trusts No One
Abolishing the idea of a trusted network inside (or outside) the corporate perimeter.
NAC was designed to work inside the perimeter – Build a perimeter around the internal network, verify who users say they are, and once in the door users gain full access to the network or at least a large portion of the network. But in this changing world, NAC falls short for seven reasons.
In our eBook, How to Overcome NAC Limitations: Why a Software-Defined Perimeter delivers better network security for today’s enterprises, we discuss the reasons NAC solutions fail to protect your network and why a Software-Defined Perimeter overcomes these limitations.
This eBook is for security, network, IT architect, operations, infrastructure and GRC professionals who want to protect access to physical, virtual and cloud-based IT systems.