Skip to Content
Network Access Control For Dummies®
book

Network Access Control For Dummies®

by Jay Kelley, Rich Campagna, Denzil Wessels
May 2009
Beginner
336 pages
8h 28m
English
For Dummies
Content preview from Network Access Control For Dummies®

9.1. All PCs Are Not Created Equal

In recent years, the sheer number of device platforms that you can find in a typical enterprise network has mushroomed Windows, Macintosh, Linux, Unix, Solaris, Windows Mobile, Apple iPhone, Symbian, RIM BlackBerry, Google Android, and more.

Different groups within the organizations have different reasons for their platform of choice, and nowhere has choice manifested itself more openly than with the enormous popularity of mobile devices. The question you have to ask yourself right now is, "How can I possibly keep our data secure with so many different types of devices on the network?"

Figure 9-1 shows several possible devices that a typical end user might use during the course of the day. Multiply this group of devices by potentially thousands of users, each with his or her own personal machine preference, and you end up with a very large list of devices on the corporate network that require access to e-mail, files, applications, and more.

Without help from a NAC solution, you definitely can't easily classify these different devices and gauge an appropriate security posture. Fortunately, most NAC vendors realize that today's modern organizations require choice and mobility, so product offerings are evolving to support more and more devices. After all, the first step in deciding whether a device can access the network involves determining what type of device it is.

Figure 9.1. The types of devices that a user works with during a typical day ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.

Read now

Unlock full access

More than 5,000 organizations count on O’Reilly

AirBnbBlueOriginElectronic ArtsHomeDepotNasdaqRakutenTata Consultancy Services

QuotationMarkO’Reilly covers everything we've got, with content to help us build a world-class technology community, upgrade the capabilities and competencies of our teams, and improve overall team performance as well as their engagement.
Julian F.
Head of Cybersecurity
QuotationMarkI wanted to learn C and C++, but it didn't click for me until I picked up an O'Reilly book. When I went on the O’Reilly platform, I was astonished to find all the books there, plus live events and sandboxes so you could play around with the technology.
Addison B.
Field Engineer
QuotationMarkI’ve been on the O’Reilly platform for more than eight years. I use a couple of learning platforms, but I'm on O'Reilly more than anybody else. When you're there, you start learning. I'm never disappointed.
Amir M.
Data Platform Tech Lead
QuotationMarkI'm always learning. So when I got on to O'Reilly, I was like a kid in a candy store. There are playlists. There are answers. There's on-demand training. It's worth its weight in gold, in terms of what it allows me to do.
Mark W.
Embedded Software Engineer

You might also like

Integrated Security Technologies and Solutions - Volume II: Cisco Security Solutions for Network Access Control, Segmentation, Context Sharing, Secure Connectivity and Virtualization

Integrated Security Technologies and Solutions - Volume II: Cisco Security Solutions for Network Access Control, Segmentation, Context Sharing, Secure Connectivity and Virtualization

Chad Mitchell, Jamie Sanbower, Aaron Woland, Vivek Santuka

Publisher Resources

ISBN: 9780470398678Purchase book