dcsimg

9 Top Network Access Control (NAC) Solutions

SHARE
Share it on Twitter  
Share it on Facebook  
Share it on Linked in  
Email  

Network Access Control (NAC) helps enterprises implement policies for controlling devices and user access to their networks. NAC can set policies for resource, role, device and location-based access and enforce security compliance with security and patch management policies, among other controls.

Jump to:

NAC is an effort to create order out of the chaos of connections from within and outside the organization. Personnel, customers, consultants, contractors and guests all need some level of access. In some cases, it is from within the campus and at other times access is remote. Adding to the complexity are bring your own device (BYOD) policies, the prevalence of smartphones and tablets, and the rise of the Internet of Things (IoT).

NAC was the highest IT security spending priority in eSecurity Planet's 2019 State of IT Security survey – and is also one of the technologies users have the most confidence in.

Minimum capabilities

According to Gartner, the minimum capabilities of NAC are:

  • Dedicated policy management to define and administer security configuration requirements, and specify the access control actions for compliant and noncompliant endpoints
  • Ability to conduct a security state baseline for any endpoint attempting to connect and determine the suitable level of access
  • Access control so you can block, quarantine or grant varying degrees of access.
  • The ability to manage guest access
  • A profiling engine to discover, identify and monitor endpoints
  • Some method of easy integration with other security applications and components

Top 9 NAC solutions

Impulse SafeConnect

Impluse SafeConnect offers automatic device discovery and can support anywhere from 250 to 25,000 endpoints and up with its scalable appliance architecture. The company started in education and has expanded to government and corporate markets.

Get an in-depth look at Impulse SafeConnect
Read user reviews of Impulse SafeConnect

Extreme Networks ExtremeControl

ExtremeControl is popular with education, entertainment, hospitality and healthcare customers and can scale to 200,000 endpoints. It offers a rule-based architecture to automate access based on use cases.

Get an in-depth look at Extreme Networks ExtremeControl
Read user reviews of Extreme Networks ExtremeControl

Auconet BICS

Auconet BICS offers network monitoring, asset management and other functions in addition to NAC. It plays well in large, complex implementations, with up to 60,000 devices identified per hour with 100% device discovery and implementations of more than 500,000 ports.

Get an in-depth look at Auconet BICS
Read user reviews of Auconet BICS

ForeScout CounterACT

CounterACT plays well in regulated environments such as defense, finance, healthcare and retail. The company boasts implementations of more than a million endpoints, and the technology can protect medical devices too.

Get an in-depth look at ForeScout CounterACT
Read user reviews of ForeScout CounterACT

Pulse Policy Secure

Pulse Policy Secure supports up to 50,000 concurrent users in multi-vendor environments. It offers automatic deployment and threat intelligence options.

Get an in-depth look at Pulse Policy Secure

HPE Aruba ClearPass

ClearPass is especially suited for high-volume authentication environments, offering more than 10 million authentications a day, as well as distributed environments requiring local authentication survivability across multiple geographies.

Get an in-depth look at HPE Aruba ClearPass
Read user reviews of HPE Aruba ClearPass

FortiNAC

Fortinet acquired Bradford Networks and is integrating Bradford's Network Sentry with FortiNAC. It offers traditional NAC features as well as new capabilities tailored to the Internet of Things.

Get an in-depth look at FortiNAC
Read user reviews of
FortiNAC

Cisco Identity Services Engine

Services Engine supports up to 500,000 concurrent sessions and 1.5 million endpoints per deployment. It offers adaptive intelligence engines, automated detection and response, and machine learning.

Get an in-depth look at Cisco Identity Services Engine
Read user reviews of Cisco Identity Services Engine

InfoExpress CyberGatekeeper

InfoExpress CyberGatekeeper automates discovery and audits devices before granting network access. It is popular with educational clients; one uses it to cover 100,000 users across 200 campuses.

Get an in-depth look at InfoExpress CyberGatekeeper
Read user reviews of InfoExpress CyberGatekeeper

 

Honorable mentions

SolarWinds Access Rights Manager includes AD/Exchange/SharePoint monitoring, auditing for Windows File Share, user provisioning and permissions analysis.

Cyxtera AppGate is designed around user identity, not IP address to build a multi-dimensional profile of a user or device, authorizing users before granting access to micro-segmented networks.

Genians provides visibility of all IP-enabled devices, whether wired, wireless or virtual, ensuring they conform to enterprise security and compliance.

NetShield (formerly SnoopWall) appliances target small and midsize companies, using agentless endpoint discovery with the ability to dynamically or manually block rogue assets. Also includes malware detection.

OpenNAC Enterprise discovers all devices connected to the network, as well as profiling, segmentation, and control of access.

Portnox Core checks the operating system type of connecting devices and applies the appropriate policy to the network access point.

Product feature breakdown

top nac vendors