Network Access Control.

As the boundaries of networks become more and more fluid, there is a growing need for good tools to secure them.

An NAC product must solve the task of identifying devices that access the network, allocate resources, and enforce policies based on rules governing access to the network and its data.

Instead of looking at device content to find malicious code etc., NAC looks at which device and what it is trying to access on the network.

By defining rules for the devices owned and thier access to the network (eg laptops, smartphones and guests), the security of the network can be enhanced with a layer that complements e.g. firewall, email security and other solutions in place.

At IT2Trust we recommend NAC security solutions from: