Get Instant Access
to This Blueprint

Security icon

Secure the Network Against Remote & Rogue Endpoints in Four Steps

Focus your attention on non-wired use cases to take the “AACK!” out of NAC.

  • Most organizations have secured the organization against outside threats.
  • Unintentional threats coming from within must be dealt with before BYOD programs can flourish.
  • Previous NAC deployments failed because of a lack of ROI and executive buy-in.

Our Advice

Critical Insight

  • The rise of BYOD in organizations has driven the value and usefulness of NAC implementations up.
  • NAC implementations can secure the network from internal threats by isolating devices that don’t meet security requirements.
  • Planning the deployment of NAC properly can reduce costs and minimize costly errors.

Impact and Result

  • Prioritize and understand the different NAC deployment scenarios; LAN, WLAN, BYOD, and Remote Access.
  • Minimize spend and resources by understanding overlapping issues in each deployment type and taking advantage of shared resources and features.

Secure the Network Against Remote & Rogue Endpoints in Four Steps Research & Tools

1. Assess Your NAC Posture

Understand high-level capabilities of different NAC approaches

2. Customize your NAC Deployment

Determine a realistic set of issues that can be solved by NAC

3. Create a Comprehensive Action Plan

Prioritize NAC focus areas


Workshop: Secure the Network Against Remote & Rogue Endpoints in Four Steps

Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

Module 1: Assess Your NAC Posture

The Purpose

  • Perform a low-risk security scan on your network to identify weaknesses (with organization’s permission).
  • Understand the capabilities of NAC.
  • Identify your key focus areas for the workshop.

Key Benefits Achieved

  • Better understand the security of your network.
  • Your organization’s key focus for a NAC implementation.

Activities

Outputs

1.1

Security scan

  • Defined areas of focus for remainder of workshop
1.2

Understand high-level capabilities of different NAC approaches

Module 2: Customize Your NAC Deployment

The Purpose

  • A comprehensive understanding of your current security posture.
  • Knowledge of the current gaps to overcome to implement a full NAC solution.

Key Benefits Achieved

  • Documented data of your organization’s current NAC-related status.

Activities

Outputs

2.1

Identify existing and required key NAC supporting elements

  • NAC Capture Tool
2.2

Capture current and desired NAC for wired LAN, wireless LAN, BYOD, and remote access

  • Current and desired NAC capabilities exercise
2.3

Perform SWOT analysis

Module 3: Create a Comprehensive Action Plan

The Purpose

  • A breakdown of your organization’s strengths, weaknesses, opportunities, and threats as they relate to NAC.

Key Benefits Achieved

  • Prioritize the NAC deployment by examining your existing Strengths, Weaknesses, Opportunities, and Threats.

Activities

Outputs

3.1

Perform a gap analysis based on SWOT

  • NAC Capture Tool (SWOT analysis)
3.2

Identify alternative approaches to NAC

3.3

Prioritize NAC strategy areas (Wired LAN, Wireless LAN, BYOD, Remote Access)

3.4

Determine cost/benefits of chosen strategy areas

  • Cost/benefits chart

Module 4: Manage and Measure Success

The Purpose

  • Resources to launch your NAC Action Plan, including end-user training, policy templates, and metrics.
  • A timeline for implementation.

Key Benefits Achieved

  • Communicate effectively with end users and stakeholders.
  • Prepare appropriate NAC-related policies.
  • Measure your organization’s success with metrics.
  • Schedule your NAC implementation successfully.

Activities

Outputs

4.1

Select a NAC vendor

  • NAC Vendor Landscape
  • IDPS Vendor Landscape
  • MDM Vendor Landscape
  • SSL VPN Vendor Landscape
4.2

Create appropriate policies

  • Mobile Device Remote Wipe Waiver
  • BYOC Acceptable Use Policy
  • Security Infrastructure Policy
  • Systems Monitoring and Auditing Policy
  • Incident Response Policy
  • Authorization, Identification & Authentication Policy
  • Third-Party Access Policy
4.3

Develop a communication plan

  • BYOC Communication Plan Slideshow
  • WLAN TCO/ROI Calculator
4.4

Build end-user training

  • NAC Training Deck
4.5

Measure success of NAC deployment based on metrics

4.6

Create a timeline for implementation

Secure the Network Against Remote & Rogue Endpoints in Four Steps preview picture

About Info-Tech

Info-Tech Research Group is the world’s fastest-growing information technology research and advisory company, proudly serving over 30,000 IT professionals.

We produce unbiased and highly relevant research to help CIOs and IT leaders make strategic, timely, and well-informed decisions. We partner closely with IT teams to provide everything they need, from actionable tools to analyst guidance, ensuring they deliver measurable results for their organizations.

What Is a Blueprint?

A blueprint is designed to be a roadmap, containing a methodology and the tools and templates you need to solve your IT problems.

Each blueprint can be accompanied by a Guided Implementation that provides you access to our world-class analysts to help you get through the project.

Need Extra Help?
Speak With An Analyst

Get the help you need in this 1-phase advisory process. You'll receive 5 touchpoints with our researchers, all included in your membership.

  • Call 1: Understand high-level capabilities of different NAC components

    Talk to us about your organization’s size and unique risk profile, and we will help you determine how to get what you need out of NAC.

  • Call 2: Capture current and desired NAC states for wired LAN, wireless LAN, BYOD, and remote access

    Work with us and the NAC Capture Tool to identify current state and long-term goals.

  • Call 3: Perform a SWOT analysis

    Once we have collected your information into the NAC Capture Tool, we can take you through a SWOT analysis.

  • Call 4: Perform a gap analysis

    The completed SWOT analysis will be discussed to identify weaknesses and threats – areas that you will eventually need to address and prioritize.

  • Call 5: Select a NAC vendor

    We will provide you with the right Vendor Landscape to review. Feel free to contact us if you have further questions on product/vendor selection.

Authors

James McCloskey

Jessica Ireland

Bryan Conrad

Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019