1 / 22

Network Access Control: Lessons Learned

Network Access Control: Lessons Learned. For AITP/STL November meeting David Strom, http://strominator.com (310) 857-6867. What you’ll learn today. Four successful deployments Seven requirements Five common pitfalls. Five common NAC pitfalls.

redford
Télécharger la présentation

Network Access Control: Lessons Learned

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Network Access Control:Lessons Learned For AITP/STL November meeting David Strom, http://strominator.com (310) 857-6867 http:://strominator.com

  2. What you’ll learn today • Four successful deployments • Seven requirements • Five common pitfalls

  3. Five common NAC pitfalls • Trying to protect everyone at once • Failing to understand how many PCs really need remediation • Having too many sources of security policies around your network • Believing NAC works across your entire OS population • NAC can introduce significant login delays

  4. Our four case studies

  5. Multinational cosmetics company

  6. Pre-deployment NAC guidance for managers • I have found based on my interviews several things that our IT managers have learned and hope you can avoid their mistakes too!

  7. 1. Support for non-XP clients is spotty

  8. 2. Remediation isn’t easy

  9. 3. You can’t protect everything

  10. 4. Centralize security policy management

  11. 5. Start with simplest elements

  12. 6. Pick your pilot group carefully

  13. 7. Decide whom you want to authenticate: PCs or users?

  14. Summary and conclusions • NAC can be useful and successful with the right planning • Match the product and strategy to your particular circumstances and test carefully • Take it in baby steps, but keep your eye on the (eventual) remediation ball

  15. Got questions? Thanks for listening! David Strom david@strom.com (310) 857-6867

More Related