Secure the Network Against Remote & Rogue Endpoints in Four Steps

Focus your attention on non-wired use cases to take the “AACK!” out of NAC.

Onsite Workshop

Lack of NAC:

  • High volume of help desk tickets leads to high costs
  • Increased risk from not having visibility into devices attempting to access your network

Successful NAC implementation:

  • Cost savings
  • Operational efficiencies
  • Reduced risk
  • End-user satisfaction with wireless guest access, ability to support remote workers and mobile devices

Module 1: Assess Your NAC Posture

The Purpose

  • Perform a low-risk security scan on your network to identify weaknesses (with organization’s permission).
  • Understand the capabilities of NAC.
  • Identify your key focus areas for the workshop.

Key Benefits Achieved

  • Better understand the security of your network.
  • Your organization’s key focus for a NAC implementation.

Activities: Outputs:
1.1 Security scan
  • Defined areas of focus for remainder of workshop
1.2 Understand high-level capabilities of different NAC approaches

Module 2: Customize Your NAC Deployment

The Purpose

  • A comprehensive understanding of your current security posture.
  • Knowledge of the current gaps to overcome to implement a full NAC solution.

Key Benefits Achieved

  • Documented data of your organization’s current NAC-related status.

Activities: Outputs:
2.1 Identify existing and required key NAC supporting elements
  • NAC Capture Tool
2.2 Capture current and desired NAC for wired LAN, wireless LAN, BYOD, and remote access
  • Current and desired NAC capabilities exercise
2.3 Perform SWOT analysis

Module 3: Create a Comprehensive Action Plan

The Purpose

  • A breakdown of your organization’s strengths, weaknesses, opportunities, and threats as they relate to NAC.

Key Benefits Achieved

  • Prioritize the NAC deployment by examining your existing Strengths, Weaknesses, Opportunities, and Threats.

Activities: Outputs:
3.1 Perform a gap analysis based on SWOT
  • NAC Capture Tool (SWOT analysis)
3.2 Identify alternative approaches to NAC
3.3 Prioritize NAC strategy areas (Wired LAN, Wireless LAN, BYOD, Remote Access)
3.4 Determine cost/benefits of chosen strategy areas
  • Cost/benefits chart

Module 4: Manage and Measure Success

The Purpose

  • Resources to launch your NAC Action Plan, including end-user training, policy templates, and metrics.
  • A timeline for implementation.

Key Benefits Achieved

  • Communicate effectively with end users and stakeholders.
  • Prepare appropriate NAC-related policies.
  • Measure your organization’s success with metrics.
  • Schedule your NAC implementation successfully.

Activities: Outputs:
4.1 Select a NAC vendor
  • NAC Vendor Landscape
  • IDPS Vendor Landscape
  • MDM Vendor Landscape
  • SSL VPN Vendor Landscape
4.2 Create appropriate policies
  • Mobile Device Remote Wipe Waiver
  • BYOC Acceptable Use Policy
  • Security Infrastructure Policy
  • Systems Monitoring and Auditing Policy
  • Incident Response Policy
  • Authorization, Identification & Authentication Policy
  • Third-Party Access Policy
4.3 Develop a communication plan
  • BYOC Communication Plan Slideshow
  • WLAN TCO/ROI Calculator
4.4 Build end-user training
  • NAC Training Deck
4.5 Measure success of NAC deployment based on metrics
4.6 Create a timeline for implementation

Workshop icon Book Your Workshop

Onsite Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn’t enough, we offer low-cost onsite delivery of our Project Workshops. We take you through every phase of your project and ensure that you have a road map in place to complete your project successfully.

Book a Workshop View Blueprint
GET HELP Contact Us
VL Methodology