Network Access Control
Nowadays, corporate networks serve many traditional and non-traditional systems, as well as tablets, smartphones, industrial control systems, virtualization platforms, wireless access points and cloud-based applications. The infrastructures with such diversity facilitate the work of IT hackers. Network access control systems (NACs) must manage these assets and control unauthorized access.
There are two types of NAC solutions. These approaches, which can be summarized as asset or user based NAC, have the advantages that are shaped according to needs. A security-centered NAC solution contributes greatly to both asset management and classification, as well as to detection and automated response processes. Integration of NAC solutions with the following security components can also be provided;
- Advanced Threat Detection (ATD)
- Enterprise Mobility Management (EMM)
- Endpoint Protection Platform/Endpoint Detection & Response (EPP/EDR)
- IT Service Management (ITSM)
- Next-Generation Firewall (NGFW)
- Privileged Access Management (PAM)
- Security Information & Event Management (SIEM)
- Vulnerability Assessment (VA)
- Open Integration Module (OIM)