Category

Network Access Management

The New Normal: Today’s Anytime, Anywhere, Means Companies Need a Different Kind of NAC Solution

By | Network Access Management | No Comments

Data security – it’s been in the news all summer, mixed up with the upcoming U.S. presidential elections. High profile stories included the infiltration of Hilary Clinton’s campaign, as well as a cyber attack on the computer systems of Donald Trump and Republican Party organizations.

And while politically motivated hacks may receive the most attention, data breaches have become the status quo across sectors and industries, with hackers continuing to find ways to infiltrate networks and steal confidential information.

Enter Next-Gen NAC (Network Access Control, also called Network Admission Control) – designed to meet today’s security needs.

A Look at Some of This Year’s Top Hacks

This article on Forbes illustrates the scope of the problem with its list of notable hacks in 2015 that includes companies like Experian and T-Mobile, the infiltration of the U.S. Office of Personnel Management (OPM), and the breach of dating site Ashley Madison. Health insurer Anthem is the largest incident on their list – with a whopping 80 million patient and employee records that were compromised.

Part of the reason for the magnitude of these breaches is that network boundaries today are ever more porous, extended by mobile apps and cloud environments. As described in one of our earlier posts, BYOD (Bring Your Own Device), together with the rapid growth of IoT (the Internet of Things), has led to real changes in the nature of network security, with a renewed focus on visibility and control from the inside-out vs. traditional outside-in focus.

Download: The 802.1x Sting Whitepaper Now!

Because any device connected to your network can function, potentially, as a gateway into your infrastructure, the need for comprehensive, real-time visibility and control is increasingly important.

A sign of the times is the growing adoption of cyber security insurance. A Wells Fargo report from September 2015 states that, “Most companies purchase cyber security and data privacy insurance to protect against financial loss.” According to the report, nearly half of companies with this insurance have had to file a claim.

And the high rate of claim filers comes as no surprise – especially as, according to the 2016 Verizon Data Breach Investigations Report, “There’s a 77% gap between time to compromise and time to discovery. While attackers accomplish their goals in days, detection is slower.”

The Growing Need for NAC

NAC certainly is not new. Infrastructure vendor solutions, 802.1x and other pure-play solutions have been available for years. NAC enables you to check whether a device meets a configuration check before it is allowed on the network, or helps you restrict access rights when a machine violates policies after it is admitted.

But today’s NACs must go much further, providing real-time device awareness and automated controls for all devices across all access layers.

Given the increasing complexity of IT challenges, you need to be able to see all users, devices, and applications attempting to access or operate on your network, including:

  • Employees and visitors
  • Remote and local
  • Wired and wireless
  • Virtual and embedded
  • PC and mobile
  • Corporate and personal
  • Authorized and unsanctioned

 

But – Why Should Your NAC Stop There?

If a NAC solution is so “aware” of your network and connected devices, shouldn’t it be capable of providing operational values beyond traditional NAC?

The answer is a resounding yes. Next-Gen NAC solutions are evolving to bring more to your enterprise than the traditional NAC feature set.

When considering a NAC solution, don’t ignore operational values and benefits the solution can provide – features and capabilities that can help you respond to events and resolve device issues, connectivity issues, VoIP issues, and application issues.

Explore the degree to which a NAC solution can help make your daily network and security operations more effective, efficient, and responsive.

Providing Comprehensive, Real-Time Visibility and Access Control

Next-Gen NAC has become a game changer in the world of information security, allowing you to answer a host of daily, operational questions that arise such as:

  • Which devices in my environment are running application X, which has known security issues?
  • Do I have any devices without the latest hotfix or critical hotfix applied?
  • What actual port is VoIP extension x5012 connected to?
  • Which ports and access points is user John Smith currently connected to?
  • Do I have any XP systems in my environment?
  • Does the environment detect and react to rogue access points?
  • Can the environment detect and react to unauthorized hubs?
  • Can I obtain a detailed port history and device history?Can I obtain a detailed port history and device history

 

With a Next-Gen NAC solution like Portnox that is truly aware of your network and devices, you can have the answer to these types of questions at your fingertips at any time. Portnox audits your network and gives you real-time information – assuring full visibility and easy-to-manage compliant access controls of devices reaching out to the network.

Bottom line: It’s time to expect more from your NAC!

Download: The 802.1x Sting Whitepaper Now!one of our earlier posts

How to Set up a Successful NAC Project

By | Network Access Management | No Comments

If you can’t beat them, join them. At least when it comes to employees bringing their own device onto the network or IoT (Internet Of Things) devices on the network. In this piece we detail six typical generic steps network administrators can take to ensure a fast and effective installation of their NAC (Network Admission Control or Network Access Control) project. However, the order of these steps will depend on the individual project, so remember to adjust your process accordingly.

    1. Server installation and initial configuration with switching and networking infrastructureImplementing a Network Admission Control project involves the initial installation and configuration of the server. This is usually installed in two tiers with a separate database layer. Before installing the server, you should double check that the hardware and network requirements are met. The entire networking infrastructure that the NAC system monitors will then be defined and configured. This is based on the characteristics of the network topology and architecture and the type and spread of the devices and endpoints. In many cases the customer network will have several different geographical sites which requires additional planning and administration delegation capabilities which can be achieve by  by categorizing into different groups (though this excludes backbone switches and servers).

Avoid the 5 Pitfalls of NAC – Get our Free Whitepaper Today! 

 

  • Defining basic profiling and authentication rules

 

Here, the profiling and authentication rules for all the devices monitored by the NAC server are defined. This step typically starts with the largest population of devices in the NAC project and works its way down the list:

      • Desktops and laptops are inspected for a domain membership of the appropriate VLAN association
      • Printers and VoIP devices are defined using SNMP or TCP/IP fingerprint for each type of device. VoIP devices have an additional verification with the IP/PBX
      • Resident Definition: Devices that do not fall into any of the above categories are remembered by the NAC according to their location and identity
      • IoT ( Internet Of Things) devices and endpoints: Create a unique fingerprint for those devices and when possible, use a third party source to validate the device identity such as management server or database.
      • Try to avoid MAC address based authentication wherever possible, this is the weakest potential authentication  profile

This is a crucial part of the implementation – plan ahead and make sure you recognize all devices you configure authentication rules for, so that you will not have unsecured devices on your network right from the beginning.

 

  • Defining inspection and compliance policies

 

This step involves defining a compliance inspection policy (posture assessment) for all devices that connect to the network, which follows these guidelines to determine the appropriate action for each device. For instance, Windows client devices that are verified with domain membership are inspected for various compliance aspects such as verification that both Symantec Antivirus SEP11 and Checkpoint PointSec are installed and running. This process can be adapted to suit MacOS, Linux and other platforms.

 

  • Testing and fine tuning of rules and policies

 

After defining policies, it is important to check whether they are valid for the majority of clients on the network. On an ever changing network, especially when BYOD and IoT are becoming a crucial part – being able to monitor the network and adjust policy quickly is crucial. Testing the environment also enables network administrators to handle exceptions and fine tune the rules to accommodate every type of device in their workplace. By enabling more switches, the NAC server will discover additional devices, such as desktops, that are not associated with any specific domain or that do not adhere to standard NAC policies. The security officer  will have to  redefine NAC policies so that any specific device’s MAC address is tied to a specific port or location and they are allowed access to the network.

 

  • Defining alerts and reports

 

Report and alerting features are a critical part of a successful NAC project. These facilitate early problem detection and faster turnaround for an increased uptime. Alerts and reporting settings are defined so organizations can reduce false-positives. The NAC server delivers alerts and reports in different formats including SMS, email, SOC integration and SNMP traps based on customer infrastructure settings and preferences.
A successful NAC project will consist of well defined alerting configuration to allow a quick detection of a security incident while avoiding overflowing the administrators.

Avoid the 5 Pitfalls of NAC – Get our Free Whitepaper Today! 

 

  • Graduating to ‘enforcement’ mode

 

Graduating the deployment to an enforcement mode is a big step in the NAC installation process. This is where the system automatically makes decisions to block or quarantine new devices or users or apply actions on existing devices users based on the chosen policies. Graduating to this enforcement mode is normally done when all the previous steps have been reviewed and verified. The most extreme policy this enforcement mode possesses is for the server to lock down a port in response to any breach attempt: at even the slightest whisper of a threat, the port will shut down immediately. A more typical configuration would be to switch devices to a different VLAN based on their characteristics and allow automatic or manual remediation.

While there are a number of alternatives available, we particularly love Portnox Network Access Control (Network Admission Control), which  is unlike other NAC products in that it doesn’t come with heavy-handed controls. It is agentless, software only, flexible and easy to use and especially suitable for an heterogeneous network with IOT (Internet Of Things) devices. It traverses across all layers, including physical, virtual and the Cloud, to provide a secure and reliable virtual representation of the network for organizations of all sizes. Portnox NAC project is easy to deploy on both corporate and operational networks.

Contact us to learn more about how Portnox NAC can help your organization secure its network.

Can Your NAC Solution Protect Operational Healthcare Technology?

By | Network Access Management | No Comments

Despite increased awareness of the need to secure electronic health records, cybercriminals are still finding a way to access sensitive patient records.

Look no further than a breach of several U.S. healthcare institutions in May, when hackers stole at least 600,000 patient records and then tried to sell more than three terabytes worth of that confidential patient data on the Dark Web.

The security firm InfoArmor discovered the breach, and told the National Healthcare and Public Health Information Sharing and Analysis Center that these kind of cyberattacks aren’t limited to hospitals. Private clinics and the vendors and suppliers of medical equipment are also at risk because they share the same digital information with hospitals and healthcare organizations. In other words, the entire healthcare industry needs to be wary of cybercrime and to take precautions.

Healthcare Needs to Better Control Devices

A hacker needs to access only one system to gain access to personally identifiable information (PII) and other medical data. Because just about every system in healthcare connects to another system and a host of devices are accessing all of those systems, healthcare data is available to many parties. Add to that long list of exposure smartphones and tablets of patients and doctors who access WiFi networks at hospitals and it’s no wonder why healthcare data is not sufficiently protected.

Download: The 802.1x Sting Whitepaper Now!

And it’s not just computers and smartphones that put data at risk. Connected medical devices were involved in the attacks that InfoArmor discovered. Attackers were able to gain access to devices and then “backdoor” them. They extracted data from network segments that have connections with compromised medical devices and other networks where health care institutions stored the received patient data and other PII. In some of the healthcare facilities that were hacked, patient data was stored in Microsoft Access desktop databases, without any special user access segregation in place.

In January 2016, the U.S. Food and Drug Administration released cybersecurity recommendations for medical device manufacturers. The recommendations include the call for manufacturers to implement a structured and systemic cybersecurity risk management program and to respond in a timely fashion to identified vulnerabilities. It’s good advice, and should be followed by the entire healthcare industry.

Solid NAC Shines a Bright Light on Devices

Hospitals, doctor offices and clinics need a centrally-located solution that provides real-time network visibility and easy management of the wide variety of corporate-issued, personal and medical devices that access their networks. They can’t afford to have unknown devices gaining access to PII.

With devices constantly changing, it’s difficult for a traditional 802.1X-based NAC solution to make heads or tails of the complex network environment. Health care providers need a single solution that can provide 100% accurate visibility of their networks.

Portnox’s Network Access Control solution shines a light on each and every device that knocks on the network door. Going a step further, Portnox NAC has a unique device signature and fingerprint capability that lets healthcare organizations easily on-board, authenticate and validate  networked medical devices. It scans and creates unique actionable signatures for even the most scan-sensitive medical devices. It assures full visibility and easy-to-manage compliant access controls of the many corporate-issued and personal devices reaching out to the network.  Healthcare Organizations such as Southwestern Vermont Health Care are already enjoying the protection that Portnox NAC offers.

If doctors disabled the wireless capabilities of the pacemaker of former U.S. Vice President Dick Cheney to prevent possible assassination attempts, then it’s clear that any and all devices can pose a threat to health care organizations. A NAC solution such as Portnox can let hospitals and clinics focus on healthcare by helping them easily manage and control network access in a complex network environment that won’t change anytime soon.

Top network management tools: How many of them are you using?

By | Network Access Management | No Comments

A network administrator can only be as strong as her toolbox. Every day, an admin faces a myriad of network problems, big and small. To efficiently solve a problem, an admin needs a “toolbox” of network management tools, programs and solutions that can time and time again handle troubleshooting, monitoring, passwords glitches, IP allocations and any situation that can slow employee progress.

We’d like to share a list of the go-to tools for network admins that get us out of jams. If you’re not already using any of these offerings, maybe you’ll consider adding them to your toolbox.

    1. Network Monitoring
      It may be hard to believe, but there’s a high-grade networking solution that monitors up to 20 servers and devices for free. Paessler’s PRTG network monitor is free for up to 100 sensors. It keeps track of LANs, WANs, servers, websites, URLs and more. We found PRTG to be a comprehensive network admin tool, and with the free version, you can use all the features, remote probes and updates available on the paid version.

Avoid the 5 Pitfalls of NAC – Get our Free Whitepaper Today! 

 

  • Terminal Emulation
    Looking for an efficient, secure remote access tool? SecureCRT for Windows, Mac and Linux provides “rock-solid” terminal emulation. It’s known for its advanced session management capabilities and how it secures business applications running on UNIX, Linux and VMS. Everyone in your organization will have secure remote access and can transfer files between network devices. Network administrators can also automate repetitive tasks and save precious time by running scripts.

 

 

  • Remote Access
    Airconsole Enterprise Server is an inexpensive but effective console server. Simultaneously run multiple web terminals from a single browser and cut and paste between them. Your browser will do; no downloads are necessary. It can also aggregate both roaming field engineers who are connecting to field devices from their iPads and iPhones and fixed Airconsole and Airconsole TS serial-over-IP adaptors into a single web dashboard.

 

 

  • Packet Analysis
    When Wireshark isn’t enough, Steel Center Packet Analyzer offers an expansive graphical display that will let you quickly sort through terabytes of packet data to identify the source of network anomalies and application performance issues. If you integrate this “personal edition” with Riverbed AirPcap adapters, you can analyze and troubleshoot 802.11 wireless networks.
  • Syslog for Troubleshooting
    Kiwi receives, logs, displays, alerts on, and forwards syslog, SNMP trap, and Windows event log messages from routers, switches, firewalls, Linux and UNIX hosts, and Windows machines. If that’s a mouthful, consider that it deploys quickly, monitors real-time logs, troubleshoots, responds to messages and complies with regulations.
  • Text Editing
    A network admin should know Vim, the modal text editor based on the older model vi editor. Vim is the text editor that will be used on most any *nix system. Keep in mind that Vim comes without tutorials; you have to learn this tool on your own. But it will make text editing efficient, and it can be configured to work like a notepad.
  • Creating Configurations
    There’s a way to quickly and accurately configure many similar devices: create a template and then use a Word feature called Mail Merge to create the actual configurations. Mail Merge can be linked to an Excel spreadsheet to pull in data. Excel is a great tool for network configuration once you get formulas down. For more insight, check out this detailed guide.

 

Avoid the 5 Pitfalls of NAC – Get our Free Whitepaper Today! 

 

  • WiFi Analyzer
    All you need is an Android device to download this free app. It shows all WiFi networks within range of your device, and will help you find the one with the least amount of traffic and strongest signal.
  • Network Access Control

 

Just as the eight tools above are Network Admin tools that you can’t work without, the same holds true for a tool we know well: Portnox CLEAR. Network administration is a lot easier with CLEAR: You’ll be alerted of the dangers that wired, wireless or VPN endpoints pose before they join and while they are on your network. CLEAR easily adds or removes devices, and it constantly changes risk profiles so that access is accommodating to employees but also imposing to those who don’t belong. Schedule a demo to find out how Portnox CLEAR can be your favorite network admin tool.

Choosing The right NAC Solution – How to lasso your devices

By | Network Access Management | No Comments

It’s no fun herding cats. They are difficult to control, and it’s nearly impossible to tell one cat from another when they’re scattered all over the place.

Network administrators undoubtedly can relate. Controlling their company’s network access essentially amounts to “herding” numerous independent devices that are sometimes unpredictable (they’re not all safe) and hard to distinguish.

Many administrators have all but thrown their hands in the air. They’ve tried a network access control (NAC) solution — maybe several of them — and found it difficult to deploy or maintain. Or their current solution is in dire need of updating but they’re unsure if a new offering is worth trying.

NAC solutions have been around seemingly forever — actually for more than a decade — but they are still relevant. The increase in Bring Your Own Devices (BYOD) in the workplace, Internet of Things (IOT) applications, and machine-to-machine networks means there’s more of a need than ever for an effective access control solution. Businesses recognize they can no longer rely on IT administrators who wear too many hats as they frantically attempt to balance productivity – approving authorized and safe devices – with security.

The NAC market is expected to grow by 30.2% yearly over the next six years, according to Grand View Research. A rising demand – a growing clamor, so to speak – for manageable and insightful endpoint intelligence is prompting businesses to seek innovative NAC solutions. Shouldn’t your enterprise be one of the many businesses that invests in a NAC solution that can herd all devices? If you’re debating the value of a new NAC solution, here are three basic reasons why your business should consider investing in an effective one.

Avoid the 5 Pitfalls of NAC – Get our Free Whitepaper Today! 

    1. You’ll Be in ControlAs the children’s author Dr. Seuss once said, “Only you can control your future.” If you can’t control the devices on your network, you won’t be able to control your network. An uncontrollable network leads to uncontrollable business losses.A NAC solution that lets you control all of your networks – wired, wireless, VPN, cloud and virtual – and fine-tune access is the type of solution that truly provides control. Your network pro will also thank you for lowering his stress level.

 

  • You’ll See Everything trying to access your network

 

We’ve cited this Riverbed survey before but it’s more relevant than ever: 150 network engineers said they were suffering from not having full device and application visibility. And no organization likes to lose money, especially a taxpayer-funded one, but it was alarming to see in that same survey that poor network and app visibility at U.S. federal agencies cost $1 million per hour in lost productivity.

Full network visibility increases productivity. IT teamss can’t keep up with the many devices trying to access their company networks. And it’s not just the devices they know; the larger problem is trying to determine whether they should grant access to the devices of guests or the ones that look legitimate but really aren’t. Any device that connects to a network can find its way to the data, to your crown jewels… And this is what keeps your IT pro stressed – all of the time.

  • You’ll Find it Easy to Use

 

A NAC solution doesn’t have to be difficult to deploy or manage. Complicated solutions only take away valuable time that should be spent controlling your network. NAC solutions, such as the ones offered by Portnox, are simple to use. Such solutions give administrators the ability to add or remove device access without having to jump through hurdles; and access is bending, accommodating always-changing risk profiles. It’s easy to control control.

TOP 5 MOST COMMON Network Access Control PITFALLS

By | Network Access Management | No Comments

According to cio.com, IT executives (not IT professionals) often have misgivings about traditional security platforms such as firewalls and Intrusion Detection and Prevention Systems IDS\IPS. It argues, “That false sense of security can have IT executives not only disconnected with the reality of their security situations, but having a blind spot from what threats are really going on.”

This highlights the importance of network visibility in building any kind of reliable security apparatus. In the world of network security and management, visibility into events as and when they occur allows networking teams to react in real-time and take appropriate action. This can include alerting about or blocking a rogue device, monitoring user or device activity, creating audit and trail reports, trend spotting, forecasting or scanning for threats.

Network Access Control (NAC) is not a new concept. It’s been around for over a decade. It should enable organizations to answer:  “Who is currently accessing my network?” and “Should they be there?” The problem is that many NAC solutions have been too difficult to deploy and both time and resource-consuming. This is why we’ve put together “Top 5 Most Common NAC Pitfalls ” whitepaper which outlines common challenges associated with conventional

NAC deployment available today.

Download Now

In short, they are:

Appliances Everywhere:

    NAC implementations have a tendancy to become overly complex as networks expand and how to mitigate this risk with smart deployments.

Use Agents With Caution:

    Best practices to ensure network visibility remains at an optimum while working with agents, NTLM-based agents and “agentless” deployments.

Be Cautious of 802.1X:

     Looks at 802.1X and discusses its efficacy as a network visibility and endpoint management solution.

The other Kind of MAC:

    Security considerations around basing the security on MAC addresses and how to better manage them.

What You’re Still Not Seeing:

    The importance of end-to-end visibility in complex, multi-layered environments.

The above-mentioned are only a few considerations around the complex issue of network access control in an “always-on” culture.

Download the whitepaper now for the complete picture.Be Cautious of 802.1X:

birds eye view of NAC

Network Access Control: A Bird’s Eye View (Part 1)

By | Network Access Management | No Comments

In the next few blog posts, I’ll outline what Network Access Control (NAC) is and why it is a central element to keeping enterprise environments protected. This post is suitable not only for beginners to the world of network security management, but is also relevant to those more knowledgeable on the topic. We’ll be giving tips, links, and point out some tools out there that can help you get orientated around the subject of network access management. Read More

How Modern Networking Enviroments Drive The Need For Comprehensive NAC

By | Network Access Management | No Comments

Most enterprises have, at some stage, attempted to implement Network Access Control (NAC) – and for good reason. Network Teams need to know what’s happening in their environments, clients need to work seamlessly, and IT leaders need to know that the network is secure, safe and reliable. Most solutions overpromise but woefully miss the mark, as they ultimately fail to deliver on two crucial non-negotiables when it comes to comprehensive access control: visibility and granularity.

In this blog, we’ll look at why these two aspects are so crucial to keep our environments safe and manageable.

Visibility provides context to unknown threats

When a sample group of 150 Network Engineers were asked about the most important aspect around network management, the vast majority responded with visibility. But with that in mind, how can you protect your network from what you don’t know exists??

With the Internet of Things (IoT) on its stellar trajectory and many companies implementing Bring Your Own Device (BYOD) policies, IT professionals are now faced with a hidden and unseen aspect to networking that is surely set to permeate the technological landscape. This is because any device connected to your network can function as a gateway into your infrastructure. And considering that twenty billion new devices are expected to join the online sphere by 2020, the need for comprehensive real-time visibility and access control is evident.

The implications of this 15 years ago would have been minimal, since up until then NAC was mostly required for your wired network and connected devices, that generally stayed connected. But these days the game has changed to such an extent that unknown threats can come from anywhere, from anyone, and at any given moment – placing always aware visibility at the centre of holistic network management.

Download: The 802.1x Sting Whitepaper Now!

Granularity is the vehicle to unmatched visibility

An ideal NAC solution should be able to speak to every single device natively, whether it’s a camera, smartphone or computer, over Ethernet, Wireless or through a VPN. It should then be able to authenticate that device, and report back to you which one of your trusted – or untrusted – users is using it. This level of granularity often comes at the expense of extra hardware and tedious configurations, with results that often fail to deliver as promised. But without much-needed granularity in terms of network access management, IT departments are left incapacitated in their attempts to understand who is doing what in their environments. This places NAC systems that can deliver contextual views around events at the centre of a complete monitoring and management solution.

Staying afloat in a deluge of devices

In a recent article on Wired.com, it was demonstrated that hackers could easily access an iPhone from 5 meters away, and before the Galaxy users scoff, CNN Money reported that most S series phones have a fundamental flaw that allows hackers to access pretty much anything on the phone.

Combine this frightening news with the statistic that 61% of organisations allowed external devices to connect to their networks, yet only 9% of those businesses were fully aware of what those devices were, and one is left with many network introspective questions: “What are those devices accessing?” “What could they access with enough time, resources and expertise?” “Will you be prepared when it happens?” And most importantly: “Am I part of the 9%?”

NAC has become critical to the modern business infrastructure, and researchers agree. The NAC market is estimated to grow by over 30% by 2020, and although that is a large percentage, it’s still wholly disproportionate when placed alongside the growth figures for BYOD and IOT.

Download: The 802.1x Sting Whitepaper Now!

Illuminating the dark areas

What if you could shine a light on the dark areas of your network using a product that requires no agents, no appliances and is a scalable software-only solution? Portnox peeks into all areas, including the darkest areas of your network, shedding light on user devices such as tablets and mobile phones, virtual networks and the growing Internet of Things (IoT) devices. Nothing can hide. Device detection is key, and Portnox is able to verify device type, compliance and identity. Portnox requires no infrastructure changes, or software and speaks natively to every connected device.

It’s the solution that has always been promised, but is now finally being delivered.

7 NAC solution Quotes that’ll close the deal

By | Network Access Management | No Comments
  1. “Today, NAC is often positioned as a security solution to the BYOD era, but it is also increasingly becoming a very useful tool in network management — acting as a gatekeeper to the network.” – TechTarget, Rob Shapland, First BAse Technologies
  2. “NAC was intended to solve real problems and answer real questions: who is connecting to my network? Are they healthy? Can I control where they go? Can I shut them off if they misbehave?” – Network World, Joel Snyder
  3. “54% of managers at large and midsize organizations say that detecting and preventing insider attacks is harder today than it was in 2011” – Harvard Business Review Magazine, David M. Upton, Sadie Creese
  4. “Now is the time for executives across all industries to structure their thoughts about the potential impact and opportunities likely to emerge from the Internet of Things” – McKinsey Research, By Michael Chui, Markus Löffler, and Roger Roberts
  5. Cisco Systems: “You might think network security is an expense that won’t help your business grow. Instead of thinking about network security as a technical concern, consider it a business continuity issue”
  6. Kurt Mueffelmann, president and CEO for Cryptzone: “It’s remarkable that many organizations are still utilizing network security technologies developed in the nineties – a time when the Internet was still in its infancy”
  7. Fortinet CEO, Ken Xie: “End users, from the CEO down to line workers, want the ability to use personal devices for work purposes, their belief being that personal devices are more powerful, flexible, and usable than those offered by corporate. The big question many vendors are wrestling with today is how to properly secure them.”

Avoid the 5 Pitfalls of NAC – Get our Free Whitepaper Today!