We often hear that the number of network-connected devices continues to grow exponentially. By 2020, just a few months from now, Gartner indicates that almost 20.4 billion IoT devices will be connected. For many organizations, this represents nothing less than a technological tsunami. Obviously, without seeing what these devices are, and knowing what they are doing in your network in real-time, we cannot control let alone secure them. Most cybersecurity tools in use today, however, do not provide clear solutions for addressing this fundamental issue of “observability.” According to Palo Alto Networks, on average large organizations and enterprises currently employ over 130 tools to provide for their security management needs, while smaller organizations employ between 15 and 20 tools. Ideally, Network Access Control solutions should be tasked with securing the network edge. Yet traditional, legacy approaches to NAC are difficult to deploy and sustain due to the complexity of both the technology and its cost. In this webinar, we will explain why we need next-gen NAC capabilities to manage our evolving networks effectively and deploy the right technology for your cyberthreat landscape.
- The benefits of a Network Access Control solution
- NAC Architecture Comparison (RADIUS, SNMP, MIRROR/SPAN, IN-LINE, SENSOR)
- Problems with traditional NAC
- The requirements of Next-Gen NAC