Security experts caution on network access control tech

Security researchers and experts this week cautioned network administrators to consider carefully whether they need to implement network access control (NAC) technology in their security infrastructure before buying in to the current hype surrounding it.

Speaking on a panel at the Interop New York conference Josh Corman, host protection architect for Internet Security Systems Inc., said that a company should have good reason to implement NAC, not just purchase the technology because it’s the latest “buzzword” in the industry. “Do you want NAC because you heard it’s important or do you have real business problems to solve?” he said.

NAC allows companies to perform health checks on end-point devices such as PCs and mobile devices before they are granted access to company networks. For example, employee PCs might be checked to make sure they are not infected with a virus and have up-to-date antivirus definitions before being allowed onto a corporate LAN.

Corman was joined on the panel by Mike McKinnon, Americas director of security for Hewlett-Packard Co.’s ProCurve networking business; Elliott Glazer, direct of security architecture and consulting for Depository Trust and Clearing Organization; and Paul Stamp, a security analyst with Forrester Research Inc.

Speaking from a customer perspective, Glazer said he is more concerned at the moment with making sure the network infrastructure in his company itself is secure before worrying about how that network can check on the health of devices coming on to the network.

“One of the fundamental things that has to be considered when you think about NAC is, is the network secure enough?” he said. “When I look at NAC, I say it’s a great thing to do, but what do I do when someone comes in with a new piece of hardware — what’s it going to do to my network? Before I go down a NAC path, I’m going to make sure there is a secure environment there for me.”

“There’s a lot of great stuff about NAC, but for us it’s a little early,” Glazer said.

Forrester’s Stamp said that for NAC to work effectively, companies involved in providing network security and those developing client technology must work together to make sure the networks can communicate effectively with endpoint devices.

“[In NAC] it is the client-based technologies that are giving us the information, it is the client-based technologies that have to deal with any of the problems that arise,” he said. “We as security are setting the policies, but the policies are taken into actionable rules by endpoint people. We have to be open to that and help them out. … We really have to embrace the involvement of the endpoint guys.”

Would you recommend this article?


Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.

Jim Love, Chief Content Officer, IT World Canada

Featured Download

Featured Articles

ADaPT connects employers with highly skilled young workers

Help wanted. That’s what many tech companies across Canada are saying, and research shows...

Unlocking Transformation: IoT and Generative AI Powered by Cloud

Amidst economic fluctuations and disruptive forces, Canadian businesses are steering through uncharted waters. To...

Related Tech News

Tech Jobs

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

Tech Companies Hiring Right Now