17 years helping Canadian businesses
choose better software
Network Access Control (NAC)
Network access control (NAC) enforces security policies on devices and for users that connect to an organization’s computer system, in order to increase network visibility and reduce risk. NAC finds and identifies all wired and wireless devices that connect to the network. When a device is non-compliant, it’s denied access, placed in quarantine, or given restricted access to keep the network secure.
What Small and Midsize Businesses Need to Know About Network Access Control (NAC)
NAC serves as a small part of a network security system and can be based on the device, the user, and the endpoint where the access occurs. When an employee, contractor, vendor, or guest uses an endpoint device (e.g., laptop, tablet, mobile phone, Internet-of-Things (IoT) device, or another wireless device) to connect to the network, paths may be opened to security threats. As small businesses increase the number of mobile device connections on their network, NAC security tools become crucial.
Related terms
- Haptics
- WAN (Wide-Area Network)
- Intranet
- SLO (Service-Level Objective)
- Security Orchestration, Automation and Response (SOAR)
- Scalability
- Service-Level Agreement (SLA)
- Software as a Service (SaaS)
- Identity and Access Management (IAM)
- Data Center
- Augmented Reality (AR)
- Synchronous
- Multitenancy
- Chief Information Officer (CIO)
- IT Services
- Authorization
- Service-oriented Architecture (SOA)
- Platform as a Service (PaaS)
- Managed Service Provider (MSP)
- Security Information and Event Management (SIEM)