"Business executives are extremely concerned (and rightly so) that their organization may be the next publicly disclosed data breach story in the Wall Street Journal." That's how I led off a recent article, co-authored with Jon Oltsik of the Enterprise Strategy Group, on network access control (aka secure network access).
Secure network access authenticates users wanting to access the network, performs endpoint health checks, and authorizes network and application access based on role-based policies.
Network access control tied to one vendor's switching platform has been used as part of a lock-in strategy by network vendors. In a hyperconnected world, the last thing you want is a 'closed' access control strategy.
Continue Reading...
Recent Comments