10.3. Summary

The following are key points from this chapter:

  • NAC/NAP functionality can be found in many products that aren't officially marketed as NAC/NAP solutions (for example, VPN technologies).

  • There are many different NAC/NAP solutions from many different vendors available today.

  • The number one question you should ask of a NAC/NAP solution is if it protects against the threats that you see to your organization (that is, mobile devices as they are mobile, unauthorized users, and so on).

Chapter 2 through Chapter 5 of this book can be used as a reference point to analyze potential NAC/NAP solutions for your organization.

Get Implementing NAP and NAC Security Technologies: The Complete Guide to Network Access Control now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.