Defending against the rogue

…unwanted users, devices and applications

Published February 2016

Network access control (NAC) technologies have traditionally been used to control access to network resources and to reduce malware propagation through user and device authentication. As networks continue to evolve in complexity, encompassing ever more devices, resource access methods and applications, there is a growing need for real time visibility across the network as well as endpoints, users and applications in order to efficiently protect resources and remediate threats or policy violations both before and after they are allowed on the network.

This document is intended for organisations across all industries that are concerned about rogues, that are grappling with the need for better network and endpoint security in the light of today’s compliance requisites and growing threat landscape, and that wish to embrace new technology developments such as mobile usage and the consumerisation of IT to better support their users.