Defending against the rogue - unwanted users, devices and applications
Date:
By: Fran Howarth
Classification: White Paper
NAC technologies have evolved over the past decade since their introduction and are now essential tools for ensuring that only known and appropriate devices, applications and users can access network resources, whilst keeping those that pose a security threat off the network, or limited to only necessary resources, until issues are resolved. They improve an organisation’s risk posture and are key for aiding organ- isations in achieving their compliance and governance obligations, whilst allowing them to embrace new, more effective ways of working in a secure and efficient manner.