- Most organizations have secured the organization against outside threats.
- Unintentional threats coming from within must be dealt with before BYOD programs can flourish.
- Previous NAC deployments failed because of a lack of ROI and executive buy-in.
Our Advice
Critical Insight
- The rise of BYOD in organizations has driven the value and usefulness of NAC implementations up.
- NAC implementations can secure the network from internal threats by isolating devices that don’t meet security requirements.
- Planning the deployment of NAC properly can reduce costs and minimize costly errors.
Impact and Result
- Prioritize and understand the different NAC deployment scenarios; LAN, WLAN, BYOD, and Remote Access.
- Minimize spend and resources by understanding overlapping issues in each deployment type and taking advantage of shared resources and features.
Workshop: Secure the Network Against Remote & Rogue Endpoints in Four Steps
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Module 1: Assess Your NAC Posture
The Purpose
- Perform a low-risk security scan on your network to identify weaknesses (with organization’s permission).
- Understand the capabilities of NAC.
- Identify your key focus areas for the workshop.
Key Benefits Achieved
- Better understand the security of your network.
- Your organization’s key focus for a NAC implementation.
Activities
Outputs
Security scan
- Defined areas of focus for remainder of workshop
Understand high-level capabilities of different NAC approaches
Module 2: Customize Your NAC Deployment
The Purpose
- A comprehensive understanding of your current security posture.
- Knowledge of the current gaps to overcome to implement a full NAC solution.
Key Benefits Achieved
- Documented data of your organization’s current NAC-related status.
Activities
Outputs
Identify existing and required key NAC supporting elements
- NAC Capture Tool
Capture current and desired NAC for wired LAN, wireless LAN, BYOD, and remote access
- Current and desired NAC capabilities exercise
Perform SWOT analysis
Module 3: Create a Comprehensive Action Plan
The Purpose
- A breakdown of your organization’s strengths, weaknesses, opportunities, and threats as they relate to NAC.
Key Benefits Achieved
- Prioritize the NAC deployment by examining your existing Strengths, Weaknesses, Opportunities, and Threats.
Activities
Outputs
Perform a gap analysis based on SWOT
- NAC Capture Tool (SWOT analysis)
Identify alternative approaches to NAC
Prioritize NAC strategy areas (Wired LAN, Wireless LAN, BYOD, Remote Access)
Determine cost/benefits of chosen strategy areas
- Cost/benefits chart
Module 4: Manage and Measure Success
The Purpose
- Resources to launch your NAC Action Plan, including end-user training, policy templates, and metrics.
- A timeline for implementation.
Key Benefits Achieved
- Communicate effectively with end users and stakeholders.
- Prepare appropriate NAC-related policies.
- Measure your organization’s success with metrics.
- Schedule your NAC implementation successfully.
Activities
Outputs
Select a NAC vendor
- NAC Vendor Landscape
- IDPS Vendor Landscape
- MDM Vendor Landscape
- SSL VPN Vendor Landscape
Create appropriate policies
- Mobile Device Remote Wipe Waiver
- BYOC Acceptable Use Policy
- Security Infrastructure Policy
- Systems Monitoring and Auditing Policy
- Incident Response Policy
- Authorization, Identification & Authentication Policy
- Third-Party Access Policy
Develop a communication plan
- BYOC Communication Plan Slideshow
- WLAN TCO/ROI Calculator
Build end-user training
- NAC Training Deck
Measure success of NAC deployment based on metrics
Create a timeline for implementation