Download our free NAC Vendor Report based on 35+ real user experiences.
Network Access Control (NAC) helps enterprises implement policies for controlling devices and user access to their networks. NAC can set policies for resource, role, device and location-based access and enforce security compliance with security and patch management policies, among other controls.
NAC is an effort to create order out of the chaos of connections from within and outside the organization. Personnel, customers, consultants, contractors and guests all need some level of access. In some cases, it is from within the campus and at other times access is remote. Adding to the complexity are bring your own device (BYOD) policies, the prevalence of smartphones and tablets, and the rise of the Internet of Things (IoT).
NAC was the highest IT security spending priority in eSecurity Planet's 2019 State of IT Security survey – and is also one of the technologies users have the most confidence in.
- NAC product comparison chart
- Impulse SafeConnect
- Extreme Networks ExtremeControl
- Auconet BICS
- ForeScout CounterACT
- Pulse Policy Secure
- HPE Aruba ClearPass
- Cisco Identity Services Engine
- InfoExpress CyberGatekeeper
- Honorable mentions
According to Gartner, the minimum capabilities of NAC are:
- Dedicated policy management to define and administer security configuration requirements, and specify the access control actions for compliant and noncompliant endpoints
- Ability to conduct a security state baseline for any endpoint attempting to connect and determine the suitable level of access
- Access control so you can block, quarantine or grant varying degrees of access.
- The ability to manage guest access
- A profiling engine to discover, identify and monitor endpoints
- Some method of easy integration with other security applications and components
Top 9 NAC solutions
Impluse SafeConnect offers automatic device discovery and can support anywhere from 250 to 25,000 endpoints and up with its scalable appliance architecture. The company started in education and has expanded to government and corporate markets.
ExtremeControl is popular with education, entertainment, hospitality and healthcare customers and can scale to 200,000 endpoints. It offers a rule-based architecture to automate access based on use cases.
Auconet BICS offers network monitoring, asset management and other functions in addition to NAC. It plays well in large, complex implementations, with up to 60,000 devices identified per hour with 100% device discovery and implementations of more than 500,000 ports.
CounterACT plays well in regulated environments such as defense, finance, healthcare and retail. The company boasts implementations of more than a million endpoints, and the technology can protect medical devices too.
Pulse Policy Secure supports up to 50,000 concurrent users in multi-vendor environments. It offers automatic deployment and threat intelligence options.
Get an in-depth look at Pulse Policy Secure
ClearPass is especially suited for high-volume authentication environments, offering more than 10 million authentications a day, as well as distributed environments requiring local authentication survivability across multiple geographies.
Fortinet acquired Bradford Networks and is integrating Bradford's Network Sentry with FortiNAC. It offers traditional NAC features as well as new capabilities tailored to the Internet of Things.
Cisco Identity Services Engine
Services Engine supports up to 500,000 concurrent sessions and 1.5 million endpoints per deployment. It offers adaptive intelligence engines, automated detection and response, and machine learning.
InfoExpress CyberGatekeeper automates discovery and audits devices before granting network access. It is popular with educational clients; one uses it to cover 100,000 users across 200 campuses.
SolarWinds Access Rights Manager includes AD/Exchange/SharePoint monitoring, auditing for Windows File Share, user provisioning and permissions analysis.
Cyxtera AppGate is designed around user identity, not IP address to build a multi-dimensional profile of a user or device, authorizing users before granting access to micro-segmented networks.
Genians provides visibility of all IP-enabled devices, whether wired, wireless or virtual, ensuring they conform to enterprise security and compliance.
NetShield (formerly SnoopWall) appliances target small and midsize companies, using agentless endpoint discovery with the ability to dynamically or manually block rogue assets. Also includes malware detection.
OpenNAC Enterprise discovers all devices connected to the network, as well as profiling, segmentation, and control of access.
Portnox Core checks the operating system type of connecting devices and applies the appropriate policy to the network access point.