Chapter 1. Developing a Knack for NAC

In This Chapter

  • Approaching network access control (NAC)

  • Selecting the best approach

  • Using your existing network infrastructure

Because you're looking at this book, you've probably heard or read all the hoopla about network access control (NAC). You've likely heard or read reports that NAC is the best thing since sliced bread, the be-all-and-end-all solution for network security or access control, and the best solution for network and device security since antivirus software and two-factor authentication.

Have you also heard that NAC isn't all it's cracked up to be? That it's costly, it takes a lot of time and labor to deploy, working with it can be trying, users don't like it, and it doesn't alleviate every network security and access control issue? Or perhaps that NAC doesn't provide you with a good return on your network security and access control investment?

You probably have at least one peer who told you that NAC isn't the only solution for all that ails networks and network security. And maybe you read or heard about the demise of the NAC market or product category — reports which have been greatly exaggerated.

Boy howdy, is this book for you!

In this chapter (and the whole book), you can discover

  • What network access control (NAC) is — at least, according to many smart people and organizations

  • The breadth of NAC

  • How to home in on what makes the best NAC approach for your organization

  • How some NAC solutions can enable you to leverage, repurpose, ...

Get Network Access Control For Dummies® now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.