UBM: TECH DIGITAL RESOURCE LIBRARY

Network Access Control, Part II

Jun 01, 2007

Download Compliance initiatives are driving deployments of network access control, but which system is best? Many vendors, both new and established, are offering NAC solutions. Finding a product that meets an organization's needs may be daunting given the number of options, but a fit is out there. This report analyzes enterprise use of NAC, based on the authors' expertise and market knowledge, as well as NWC polls of members of the IT community.

This report is a follow-up to last year's NWC Analytics report on the NAC space, updating technology developments, vendor strategies and product availability.

Report Table of Contents:
Executive Summary
Research Synopsis
Status of NAC Deployments
Drivers
Pain Points
NAC Concerns
Deployments
Framework Preferences
Vendor Analysis
AEP Networks
Altiris
Bradford Networks
Check Point Software
Technologies
Cisco Systems
ConSentry Networks
FireEye
ForeScout Technologies
Fortinet
Hewlett-Packard ProCurve
Networking Identity Engines
Impulse Point
InfoExpress
Juniper Networks
Lockdown Networks
Microsoft
Mirage Networks
Nevis Networks
Nortel Networks
Sophos
StillSecure
Symantec
TippingPoint
Trend Micro
Trusted Network Technologies
Vernier Networks


Research Report