{"id":10890,"date":"2021-06-04T16:23:55","date_gmt":"2021-06-04T14:23:55","guid":{"rendered":"https:\/\/sertalink.com\/?page_id=10890"},"modified":"2023-04-19T20:44:17","modified_gmt":"2023-04-19T18:44:17","slug":"network-access-control-nac","status":"publish","type":"page","link":"https:\/\/sertalink.com\/nl\/network-access-control-nac\/","title":{"rendered":"Network Access Control (NAC)"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; background_image=&#8221;https:\/\/sertalink.com\/wp-content\/uploads\/2023\/03\/purp2-1-1.png&#8221; background_position=&#8221;top_left&#8221; custom_padding=&#8221;13em||||false|false&#8221; custom_padding_tablet=&#8221;&#8221; custom_padding_phone=&#8221;5em||||false|false&#8221; da_disable_devices=&#8221;off|off|off&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; width_tablet=&#8221;&#8221; width_phone=&#8221;85%&#8221; width_last_edited=&#8221;on|phone&#8221; animation_style=&#8221;zoom&#8221; animation_intensity_zoom=&#8221;10%&#8221; animation_starting_opacity=&#8221;100%&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; header_font=&#8221;Fjalla|700|||||||&#8221; header_text_color=&#8221;#FFFFFF&#8221; header_font_size=&#8221;50px&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; hover_enabled=&#8221;0&#8243; header_font_size_tablet=&#8221;&#8221; header_font_size_phone=&#8221;35px&#8221; header_font_size_last_edited=&#8221;on|phone&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h1>Network Access Control (NAC)<\/h1>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Montserrat Regular||||||||&#8221; text_text_color=&#8221;#bfbfbf&#8221; text_font_size=&#8221;16px&#8221; header_font=&#8221;Fjalla|700|||||||&#8221; header_text_color=&#8221;#FFFFFF&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;]<a href=\"https:\/\/sertalink.com\/\" style=\"color: #fff;\">Homepage<\/a>\/ Network Access Control (NAC)[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;4.6.6&#8243; custom_padding=&#8221;1px|||||&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221; da_disable_devices=&#8221;off|off|off&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; background_image=&#8221;https:\/\/sertalink.com\/wp-content\/uploads\/2021\/04\/Capture.png&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;|-126px||||&#8221; custom_padding=&#8221;38px|||||&#8221;]<\/p>\n<h3><span style=\"color: #000000;\">Network Access Control (NAC)<\/span><\/h3>\n<p><span style=\"color: #000000;\"><\/span><\/p>\n<p><span style=\"color: #000000;\"><\/span><\/p>\n<p><span style=\"color: #000000;\"><\/span><\/p>\n<h4><span style=\"color: #000000;\">Security for networks with IoT<\/span><\/h4>\n<div class=\"factors\"><\/div>\n<div class=\"factors\"><\/div>\n<div class=\"factors\"><\/div>\n<h4><\/h4>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/sertalink.com\/wp-content\/uploads\/2021\/06\/Capture-26-300&#215;264.png&#8221; title_text=&#8221;Capture&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|||124px||&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<div class=\"C15-Title\">\n<h4 class=\"  u-headline-onlyBottom \"><span style=\"color: #000000;\">What is Network Access Control (NAC)?<\/span><\/h4>\n<\/div>\n<div class=\"C32-Text text parbase\">\n<p><a href=\"https:\/\/globenewswire.com\/news-release\/2016\/03\/30\/824012\/0\/en\/2-6-Network-Access-Control-Market-2016-Global-Forecast-to-2020.html\"><\/a>Network access control, or NAC, is a<span>\u00a0<\/span>zero-trust<span>\u00a0<\/span>network access solution that provides users with enhanced visibility into the Internet of Things (IoT) devices on their corporate networks.\u00a0<\/p>\n<p>This technology has been around for nearly two decades, but a new generation of its solutions is helping organizations keep up with today\u2019s ever-expanding attack surface, delivering not only visibility of the network environment, but also enforcement and dynamic policy control.\u00a0\u00a0Whether devices are connecting from inside or outside the network, it can automatically respond to compromised devices or anomalous activity.<\/p>\n<p>Modern solutions also provide a clear view into network assets to support regulatory certifications and security best practices that require organizations to establish and maintain an accurate inventory of all connected devices\u2014even in virtual environments where assets are constantly connecting and disconnecting from the network. The monitoring and response capabilities are especially critical since many devices open users to additional risk via compromised, poorly written and un-patchable software, unadvertised back doors hardwired into firmware, and other factors.<\/p>\n<p>NAC is an important part of a Zero Trust Network Access model for security, in which trust is no longer implicit for users, applications, or devices attempting to access the network, and for which IT teams can easily know who and what are accessing the network, as well as how to protect corporate assets both on and off the network.<\/p>\n<\/div>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<div class=\"C15-Title\">\n<h4 class=\" u-headline-topBottom  \"><span style=\"color: #000000;\">How NAC Secures Your Network<\/span><\/h4>\n<\/div>\n<div class=\"C32-Text text parbase\">\n<p><a href=\"https:\/\/globenewswire.com\/news-release\/2016\/03\/30\/824012\/0\/en\/2-6-Network-Access-Control-Market-2016-Global-Forecast-to-2020.html\"><\/a>NAC provides\u00a0visibility over everything connected to the network, as well as the ability to control those devices and users, including dynamic, automated responses. It plays a role in strengthening overall network security infrastructure.<\/p>\n<p>A properly functioning solution can deny access to noncompliant users or devices, place them in quarantine, or restrict access to a small number of network resources, separated from the rest of the network. NAC generally supports the following:<\/p>\n<ol>\n<li style=\"list-style-type: none;\">\n<ol>\n<li>Authentication and authorization of users and devices<\/li>\n<li>User and device profiling<\/li>\n<li>Denial of unsecured devices<\/li>\n<li>Quarantine of unsecured devices<\/li>\n<li>Restricting access to unsecured devices<\/li>\n<li>Policy lifecycle management<\/li>\n<li>Overall security posture assessment<\/li>\n<li>Incident response through policy enforcement<\/li>\n<li>Guest networking access<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<\/div>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<div class=\"C15-Title\">\n<h4 class=\" u-headline-topBottom  \"><span style=\"color: #000000;\">Network Access Control Benefits and Use Cases<\/span><\/h4>\n<\/div>\n<div class=\"C15-Title\">\n<h5 class=\"   text-align--center\" style=\"text-align: center;\"><span style=\"color: #000000;\">IoT and BYOD<\/span><\/h5>\n<\/div>\n<div class=\"C32-Text text parbase\">\n<p>The adoption of IoT devices is growing exponentially, especially in high-risk markets such as healthcare and retail where even a few years ago there were far fewer network-connected devices. Converging with this trend is<span>\u00a0<\/span>BYOD (Bring Your Own Device)<a href=\"https:\/\/www.fortinet.com\/resources\/cyberglossary\/byod\" target=\"_blank\" rel=\"noopener\">,<\/a><span>\u00a0<\/span>which over more than a decade has brought an influx of new mobile devices connecting to corporate networks. Both create substantial new security risks and open new threat vectors, and unsecured devices dramatically increase the risk of intrusion, breach, and a catastrophic cyberattack. The right NAC solutions ensure compliance for all devices connecting to networks, checking that proper controls are in place before corporate network resources are accessible.<\/p>\n<p>There are now billions of non-traditional compute, IP-enabled devices that are connecting to networks. (This means basically everything on the network that isn&#8217;t a laptop or mobile phone, from IP cameras, to VoIP phones, printers, HVAC controls, temperature sensors, badge readers, digital displays, bluetooth sensors, and many more examples.)<\/p>\n<p>&nbsp;<\/p>\n<\/div>\n<div class=\"C15-Title\">\n<h5 class=\" u-headline-topBottom  text-align--center\" style=\"text-align: center;\"><span style=\"color: #000000;\">Incident Response<\/span><\/h5>\n<\/div>\n<div class=\"C32-Text text parbase\">\n<p>The role of NAC in incident response is often significant. Solutions can be configured to automatically enforce security policies, share contextual information, and isolate unsecure devices from accessing other parts of a network.<\/p>\n<p>&nbsp;<\/p>\n<\/div>\n<div class=\"C15-Title\">\n<h5 class=\" u-headline-topBottom  text-align--center\" style=\"text-align: center;\"><span style=\"color: #000000;\">Contractors<\/span><\/h5>\n<\/div>\n<div class=\"C32-Text text parbase\">\n<p>Contractors, partner employees, and other guest workers need specialized access only to those parts of the corporate network that enable a good user experience and allow them to do their jobs. NAC plays a key role in maintaining access privileges while ensuring guest users have smooth connectivity and a good overall experience.<\/p>\n<p>&nbsp;<\/p>\n<\/div>\n<div class=\"C15-Title\">\n<h5 class=\" u-headline-topBottom  text-align--center\" style=\"text-align: center;\"><span style=\"color: #000000;\">Medicine<\/span><\/h5>\n<\/div>\n<div class=\"C32-Text text parbase\">\n<p>Healthcare is an industry rapidly embracing the Internet of Medical Things (IoMT) and now many new networked devices are coming online to support advances in medicine and medical care. But as more medical devices access the corporate network, it is critical to employ NAC solutions that can help protect devices and massive troves of sensitive personal data, including medical records. This can help improve healthcare security overall and keep medical facilities and other healthcare institutions safe from ransomware and other prevalent threats.<\/p>\n<p>&nbsp;<\/p>\n<\/div>\n<div class=\"C15-Title\">\n<h5 class=\" u-headline-topBottom  text-align--center\" style=\"text-align: center;\"><span style=\"color: #000000;\">Compliance<\/span><\/h5>\n<\/div>\n<div class=\"C32-Text text parbase\">\n<p>Regulatory compliance isn\u2019t optional, and organizations can receive serious fines and create myriad other problems if access controls aren\u2019t implemented or aren\u2019t demonstrably effective. NAC solutions have long been thought of as risk mitigation technology\u2014which they certainly are\u2014but the right ones can also help enforce compliance controls under regulations such as HIPAA, SOX, or PCI-DSS, and ensure smooth compliance audits.<\/p>\n<\/div>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<div class=\"C15-Title\">\n<h4 class=\" u-headline-topBottom  \"><span style=\"color: #000000;\">FortiNAC: Network Access Security Solution<\/span><\/h4>\n<\/div>\n<div class=\"C32-Text text parbase\">\n<p>FortiNAC is the Fortinet network access control solution. It enhances the overall Fortinet Security Fabric with visibility, control, and automated response for everything that connects to the network. It provides protection against IoT threats, extends control to third-party devices, and orchestrates automatic responses to a wide range of networking events.<\/p>\n<p><b>FortiNAC enables three key capabilities to secure IoT devices:<\/b><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Network visibility to see every device and user as they join the network<\/li>\n<li>Network control to limit where devices can go on the network<\/li>\n<li>Automated response to speed reaction time to events from days to seconds<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>The FortiNAC solution protects both wireless and wired networks with a centralized architecture that enables distributed deployments with automated responsiveness.<\/p>\n<p><b>FortiNAC is an ideal solution for any stage or maturity level of a security strategy. Using FortiNAC, organizations can:<br \/><\/b><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Deliver agent and agentless scanning of the network for detection and classification of devices<\/li>\n<li>Create an inventory of all devices on the network and assess the risk of every endpoint connected to the network<\/li>\n<li>Use a centralized architecture for easy deployment and management<\/li>\n<li>Leverage extensive support for third-party network devices to ensure overall effectiveness<\/li>\n<li>Enforce dynamic access control<\/li>\n<li>Prepare for incident response and reduce containment time to seconds, sometimes from as long as days or weeks<\/li>\n<li>Integrate with SIEM solutions to provide detailed contextual data and reduce investigation time<\/li>\n<li>Automate the onboarding and permissions process for large numbers of endpoint devices, users, and guests<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;][et_pb_button button_url=&#8221;mailto:sales@sertalink.com&#8221; url_new_window=&#8221;on&#8221; button_text=&#8221;Contact us &#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_color=&#8221;#000000&#8243; button_border_color=&#8221;#000000&#8243; button_border_radius=&#8221;86px&#8221; button_icon=&#8221;%%3%%&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Network Access Control (NAC)Homepage\/ Network Access Control (NAC)Network Access Control (NAC) Security for networks with IoT What is Network Access Control (NAC)? Network access control, or NAC, is a\u00a0zero-trust\u00a0network access solution that provides users with enhanced visibility into the Internet of Things (IoT) devices on their corporate networks.\u00a0 This technology has been around for nearly [&hellip;]<\/p>\n","protected":false},"author":26,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-10890","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v15.1.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Network Access Control (NAC) | Sertalink Belgium &amp; Luxembourg<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sertalink.com\/nl\/network-access-control-nac\/\" \/>\n<meta property=\"og:locale\" content=\"nl_BE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Network Access Control (NAC) | Sertalink Belgium &amp; Luxembourg\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sertalink.com\/nl\/network-access-control-nac\/\" \/>\n<meta property=\"og:site_name\" content=\"Sertalink Belgium &amp; Luxembourg\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/sertalink\/\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-19T18:44:17+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@sertalink_bnlx\" \/>\n<meta name=\"twitter:site\" content=\"@sertalink_bnlx\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":[\"Organization\",\"Place\"],\"@id\":\"https:\/\/sertalink.com\/nl\/#organization\",\"name\":\"Sertalink Belgium\",\"url\":\"https:\/\/sertalink.com\/nl\/\",\"sameAs\":[\"https:\/\/www.facebook.com\/sertalink\/\",\"https:\/\/www.linkedin.com\/company\/sertalink\/\",\"https:\/\/twitter.com\/sertalink_bnlx\"],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/sertalink.com\/nl\/#logo\",\"inLanguage\":\"nl-BE\",\"url\":\"https:\/\/sertalink.com\/wp-content\/uploads\/2016\/09\/sertaLinkLogo.png\",\"width\":90,\"height\":112,\"caption\":\"Sertalink Belgium\"},\"image\":{\"@id\":\"https:\/\/sertalink.com\/nl\/#logo\"},\"location\":{\"@id\":\"https:\/\/sertalink.com\/network-access-control-nac\/#local-place\"},\"address\":{\"@id\":\"https:\/\/sertalink.com\/network-access-control-nac\/#local-place-address\"},\"email\":\"sales@sertalink.com\",\"telephone\":\"+3293109351\",\"areaServed\":\"Benelux\",\"vatID\":\"BE 0632.806.125\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sertalink.com\/nl\/#website\",\"url\":\"https:\/\/sertalink.com\/nl\/\",\"name\":\"Sertalink Belgium &amp; Luxembourg\",\"description\":\"Your link to a safe environment\",\"publisher\":{\"@id\":\"https:\/\/sertalink.com\/nl\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/sertalink.com\/nl\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"nl-BE\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sertalink.com\/network-access-control-nac\/#webpage\",\"url\":\"https:\/\/sertalink.com\/network-access-control-nac\/\",\"name\":\"Network Access Control (NAC) | Sertalink Belgium &amp; Luxembourg\",\"isPartOf\":{\"@id\":\"https:\/\/sertalink.com\/nl\/#website\"},\"datePublished\":\"2021-06-04T14:23:55+00:00\",\"dateModified\":\"2023-04-19T18:44:17+00:00\",\"inLanguage\":\"nl-BE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sertalink.com\/network-access-control-nac\/\"]}]},{\"@type\":\"Place\",\"@id\":\"https:\/\/sertalink.com\/network-access-control-nac\/#local-place\",\"address\":{\"@type\":\"PostalAddress\",\"@id\":\"https:\/\/sertalink.com\/network-access-control-nac\/#local-place-address\",\"streetAddress\":\"Gentse Steenweg 47\",\"addressLocality\":\"Lokeren\",\"postalCode\":\"9160\",\"addressRegion\":\"Oost-Vlaanderen\",\"addressCountry\":\"BE\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":\"\",\"longitude\":\"\"},\"openingHoursSpecification\":[{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Monday\",\"Tuesday\",\"Wednesday\",\"Thursday\",\"Friday\"],\"opens\":\"09:00\",\"closes\":\"17:30\"},{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Saturday\",\"Sunday\"],\"opens\":\"00:00\",\"closes\":\"00:00\"}],\"telephone\":\"+3293109351\"}]}<\/script>\n<meta name=\"geo.placename\" content=\"Lokeren\" \/>\n<meta name=\"geo.region\" content=\"Belgium\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","_links":{"self":[{"href":"https:\/\/sertalink.com\/nl\/wp-json\/wp\/v2\/pages\/10890","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sertalink.com\/nl\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sertalink.com\/nl\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sertalink.com\/nl\/wp-json\/wp\/v2\/users\/26"}],"replies":[{"embeddable":true,"href":"https:\/\/sertalink.com\/nl\/wp-json\/wp\/v2\/comments?post=10890"}],"version-history":[{"count":4,"href":"https:\/\/sertalink.com\/nl\/wp-json\/wp\/v2\/pages\/10890\/revisions"}],"predecessor-version":[{"id":18020,"href":"https:\/\/sertalink.com\/nl\/wp-json\/wp\/v2\/pages\/10890\/revisions\/18020"}],"wp:attachment":[{"href":"https:\/\/sertalink.com\/nl\/wp-json\/wp\/v2\/media?parent=10890"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}