By: Bob Tarzey, Service Director, Quocirca
Published: 9th September 2013
Copyright Quocirca © 2013
Quocirca research shows that the two biggest concerns organisations have when considering the use of cloud based services are the safety of personal data and complying with the data protection laws (see free Quocirca report, The adoption of cloud based services, downloadable here). The report shows that these are issues that those recognising the benefits of such services overcome by investing in security technology.
The truth is that these concerns are high on the list of IT managers in all areas of IT deployment. The need to meet governance, risk and compliance (GRC) objectives is something that cannot be avoided. Another area where concerns have been increasing is the growing number of unmanaged devices that are attaching to networks.
There are good reasons for providing network access to such devices. Most businesses now accept the reality of employees using their own devices for work purposes (bring-your-own-device/BYOD); even if they do not like the concept, they know it must be managed somehow. Furthermore, there is an increasing need in many organisations to provide network access to guests (such as contractors and consultants) on an ad hoc basis. These two requirements have seen a resurgence of interest in network access control (NAC) systems from established vendors such as ForeScout, Bradford Networks and Portnox.
At the Infosec Europe event in April this year, Quocirca chaired a panel session where three users of NAC from very different business sectors explained why they had invested in the technology, how it helps them overcome GRC challenges and better enables both BYOD and guest network access. The session was sponsored by ForeScout and the panellists were all using the vendor’s CounterACT NAC product. The findings of the session have been written up in a freely available report that can be downloaded here.
In brief, the benefits outlined by each user were as follows:
As organisations struggle to meet GRC requirements in the face of the changing way IT systems are deployed and accessed, all areas of IT security are coming under review and advanced technologies are supplementing or replacing conventional ones. There is no silver bullet for achieving the often-related goals of better security and compliance, but NAC is proving for many to be a key building block in their overall IT security architecture.
We have not received any comments against this entry. Why not be the first?
We automatically stop accepting comments 180 days after a post is published. If you would like to know more about this subject, please contact us and we'll try to help.
Published by: IT Analysis Communications Ltd.
T: +44 (0)190 888 0760 | F: +44 (0)190 888 0761