Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analysis: Network Access Control: Page 12 of 21

In the most current offerings, NAC happens in four phases: assessment, validation, decision and enforcement.

» ASSESS: If IT assets remained static, a host of ills would be eradicated. Dream on. Devices change state constantly during use, so if a NAC product performs only a pre-assessment, as in Nortel's Secure Network Access and StillSecure's SafeAccess, the system can't detect changes on the host and, quite frankly, the value of the product plummets. Access control cannot be fire and forget. Assessments and reassessments, continuous or periodic, are critical (see "Assessment Strategies" left).

Posture assessment updates are triggered using a variety of mechanisms. These can be simple--802.1X re-authentication, a scheduled reassessment or passive monitoring--or complex, like triggering an assessment based on host activity. We surveyed NAC vendors about their reassessment strategies; most claim to continuously reassess hosts (see "Good Posture?" right).