Mobile devices, cloud computing, and security concerns are driving increasing use of granular network access controls. Remember NAC? Cisco first introduced the concept of Network Admission Control back around 2004. Back then, NAC’s primary role was checking the security status of PCs before granting them access to the network. This type of functionality was really in response to a wave of Internet worms in the early 2000s that were infecting and clogging up corporate networks.NAC became an instant network security fad that everyone wanted a part of. Microsoft introduced a competing initiative called Network Access Protection (NAP) for its “Longhorn” operating system (Vista) followed by a wave of long-lost startups like ConSentry Networks, Lockdown Networks, Mirage Networks, and Vernier. Heck, NAC was even highlighted at the RSA Conference during this timeframe.Alas, the buzz around NAC faded away around 2008 or so. Why? Probably some combination of factors including NAC project complexity (based upon the 802.1x standard), the changing threat landscape, and the financial meltdown. Well, fast forward to 2014 and NAC is back and gaining energy – albeit with far less visibility than the heady 2000s. According to a recently published ESG research report on network security, 40% of enterprise organizations enforce network access controls “extensively across the enterprise,” while 44% use NAC to some lesser degree (note: I am an ESG employee). Organizations using NAC were asked to identify the biggest drivers for doing so. According to ESG research:43% of organizations are using NAC because they believe it can help them lower IT risk42% of organizations are using NAC because of their increasing use of mobile devices and BYOD policies42% of organizations are using NAC because of increasing user mobility and the need for remote access to the corporate LAN38% of organizations are using NAC because of their increasing use of wireless networking (Wi-Fi) as the network access layer38% of organizations are using NAC because of regulatory compliance requirementsToday’s NAC has a somewhat different role than NAC circa 2006, as it is really being used for things like granular access control and risk-based authentication. In fact, many organizations are now considering multiple factors including device type, user role, access activities, and device configuration to enforce granular access policies. So NAC has pulled a technology about-face, and this momentum will only continue driven by cloud, mobility, and the Internet of Things (IoT). And while ConSentry Microsoft NAP and Nevis Networks are long gone, a number of vendors such as Aruba, Bradford Networks, Cisco, Extreme Networks, ForeScout, Hexis Cyber Solutions, and Juniper are happily dancing to NAC’s new wave. As the saying goes, “timing is everything.” The original NAC was the right idea but the wrong implementation. The new NAC may not attract Sand Hill Road money or hyperbole, but it is finally in the right place at the right time – driven by the dangerous threat landscape, mobile computing, and the increasing need to control network access at a granular level. SDN will likely play a supporting role here as well. Related content analysis 5 things security pros want from XDR platforms New research shows that while extended detection and response (XDR) remains a nebulous topic, security pros know what they want from an XDR platform. By Jon Oltsik Jul 07, 2022 3 mins Intrusion Detection Software Incident Response opinion Bye-bye best-of-breed? ESG research finds that organizations are increasingly integrating security technologies and purchasing multi-product security platforms, changing the industry in the process. By Jon Oltsik Jun 14, 2022 4 mins Security Software opinion SOC modernization: 8 key considerations Organizations need SOC transformation for security efficacy and operational efficiency. Technology vendors should come to this year’s RSA Conference with clear messages and plans, not industry hyperbole. By Jon Oltsik Apr 27, 2022 6 mins RSA Conference Security Operations Center opinion 5 ways to improve security hygiene and posture management Security professionals suggest continuous controls validation, process automation, and integrating security and IT technologies. By Jon Oltsik Apr 05, 2022 4 mins Security Practices Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe