Enterasys, McAfee, Symantec, and Trend Micro tackle our user access control scenarios
Our test infrastructure for the NAC reviews included an edge switch for the client systems, a core switch with server VLANs for the common and secured servers, and a RADIUS server for authentication. Client systems connected into the edge switch, authenticated as defined for the specific scenarios, then accessed (or attempted to access) the various areas of the network: Internet, enterprise, and limited access. We created additional policy networks for remediation and scanning as well.
For the tests, we created policies for each of the following user scenarios when possible: guest users, authenticated guest users, enterprise users, enterprise users with special access, and guest or enterprise systems with policy violations.
For some of the products, not all of the user scenarios applied, so we created scenarios that made sense for each product and made note of the distinctions. In most cases, we used VLAN assignment to move devices into the appropriate policy. In the case of the Enterasys solution, we chose the better option of using port-based policies.
In the end, we discovered that all four systems worked as advertised. The important differences in capabilities and limitations we found were mainly the result of the different approaches these vendors have taken to policy-based access control.
The test results outlined any policies that the system is not designed to enforce and success in those that it can enforce. Key criteria for evaluation were manageability, policy enforcement, scalability, reporting, setup, and value. All of these products show that the NAC marketplace is maturing, the products are improving, and there is still room for innovation.
Microsoft buried a Get Windows 10 ad generator inside this month's Internet Explorer security patch for...
Speaking at the O'Reilly Fluent conference, Eich also endorsed the Service Workers mobile app...
Microsoft’s 'Fall Update' promised to put the finishing touches on Windows 10 -- it doesn’t
Not only are warrantless searches exploding in number, the boundaries of warrants themselves are...
As the default database for Hadoop, you'd expect HBase to be more popular than it is, but its time may...
Container technology like Docker and CoreOS offers tremendous benefits in terms of flexible service and...