Secure the Network Against Remote & Rogue Endpoints in Four Steps
Focus your attention on non-wired use cases to take the “AACK!” out of NAC.
RETIRED CONTENT
Please note that the content on this page is retired. This content is not maintained and may contain information or links that are out of date.Lack of NAC:
- High volume of help desk tickets leads to high costs
- Increased risk from not having visibility into devices attempting to access your network
Successful NAC implementation:
- Cost savings
- Operational efficiencies
- Reduced risk
- End-user satisfaction with wireless guest access, ability to support remote workers and mobile devices
Book Your Workshop
Onsite Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn’t enough, we offer low-cost onsite delivery of our Project Workshops. We take you through every phase of your project and ensure that you have a road map in place to complete your project successfully.
Module 1: Assess Your NAC Posture
The Purpose
- Perform a low-risk security scan on your network to identify weaknesses (with organization’s permission).
- Understand the capabilities of NAC.
- Identify your key focus areas for the workshop.
Key Benefits Achieved
- Better understand the security of your network.
- Your organization’s key focus for a NAC implementation.
Activities: | Outputs: | |
---|---|---|
1.1 | Security scan |
|
1.2 | Understand high-level capabilities of different NAC approaches |
|
Module 2: Customize Your NAC Deployment
The Purpose
- A comprehensive understanding of your current security posture.
- Knowledge of the current gaps to overcome to implement a full NAC solution.
Key Benefits Achieved
- Documented data of your organization’s current NAC-related status.
Activities: | Outputs: | |
---|---|---|
2.1 | Identify existing and required key NAC supporting elements |
|
2.2 | Capture current and desired NAC for wired LAN, wireless LAN, BYOD, and remote access |
|
2.3 | Perform SWOT analysis |
|
Module 3: Create a Comprehensive Action Plan
The Purpose
- A breakdown of your organization’s strengths, weaknesses, opportunities, and threats as they relate to NAC.
Key Benefits Achieved
- Prioritize the NAC deployment by examining your existing Strengths, Weaknesses, Opportunities, and Threats.
Activities: | Outputs: | |
---|---|---|
3.1 | Perform a gap analysis based on SWOT |
|
3.2 | Identify alternative approaches to NAC |
|
3.3 | Prioritize NAC strategy areas (Wired LAN, Wireless LAN, BYOD, Remote Access) |
|
3.4 | Determine cost/benefits of chosen strategy areas |
|
Module 4: Manage and Measure Success
The Purpose
- Resources to launch your NAC Action Plan, including end-user training, policy templates, and metrics.
- A timeline for implementation.
Key Benefits Achieved
- Communicate effectively with end users and stakeholders.
- Prepare appropriate NAC-related policies.
- Measure your organization’s success with metrics.
- Schedule your NAC implementation successfully.
Activities: | Outputs: | |
---|---|---|
4.1 | Select a NAC vendor |
|
4.2 | Create appropriate policies |
|
4.3 | Develop a communication plan |
|
4.4 | Build end-user training |
|
4.5 | Measure success of NAC deployment based on metrics |
|
4.6 | Create a timeline for implementation |
|