Security Services

Network Access Control

Don’t overlook

The threat of internal network access

As a business you will probably refer to security in two scenarios, physical security of your premises and digital security, in the sense of the internet and protecting your business and its critical data from the criminals who could try to target you.

What is often overlooked however, is the threat that exists when people come into your building, it’s important that as a business you have an internal security policy in place for visitors and staff who may bring their own device, you shouldn’t just be allowing access into your network.

Network-Access-Control
Bring Your Own Device…

Monitoring network access

When you have visitors, or internal staff using Bring Your Own Device, you should be consciously monitoring their access to your network, which is where our Network Access Control (NAC) solution comes in.

Aruba ClearPass in conjunction with Aruba Central provides a true Single Pane Of Glass with industry leading NAC, centralised management and configuration.

This allows you via pre-configured and configurable policies to determine what to do with the client or traffic when it hits the network. When a device connects the switch or Access Point interrogates the software and based on a large range of criteria including 802.1x, AD, MAC and Certificate authentication it will identify and determine the level of access to resources to allow that individual.

Likewise, if an unknown visitor plugs into the switch and the credentials cannot be determined you can choose to either block the port or allow standard guest access only- assuming an expectation that you are allowed to be here, however allowing only access directly to the internet, with no ability to see any corporate resource.

Take a few moments to read all the information on our Internal Security solutions provided across this page and our related insight pages, watch the short video clip, download our whitepaper and then please get in touch with us as we would love the opportunity to discuss your individual business requirements with you further, please contact Data Installation & Supplies on 01274 869 099 or info@disnorth.com.

Further Information

FAQ's

What is Network Access Control (NAC)?

Network Access Control (NAC) restricts any unauthorised users from gaining any access to your organisations private network.

The way in which Network Access Control (NAC) works is by only granting access to the devices which have authority and meet your organisation’s regulations and compliance policies.

What is the most common use for Network Access Control (NAC)?

There are 2 common uses for Network Access Control (NAC), the first being Bring Your Own Device (BYOD) which is designed for employees who work both in house and remotely, so that both the user and their device have the correct permissions to access the network.

Secondly, engineer and contractor access, which grants access for those who are not directly employed by the organisation, but who require access, the relevant permissions can be set to meet their requirements.

 

What Are
The Benefits?

Security

NAC has the facility to both monitor and react to any unusual behaviour, providing an oversight to all devices used throughout the business.

Cost Savings

NAC helps your business to reduce IT resource thanks to automation and the reduced risk of financial loss from an attack.

Efficiency

As a result of automation NAC allows for efficiency in the authentication of both users and devices.

Security

NAC has the facility to both monitor and react to any unusual behaviour, providing an oversight to all devices used throughout the business.

Cost Savings

NAC helps your business to reduce IT resource thanks to automation and the reduced risk of financial loss from an attack.

Efficiency

As a result of automation NAC allows for efficiency in the authentication of both users and devices.

Partnering with
software-support

Understanding

Data Installation & Supplies strive to fully understand the challenges faced by our customers.

We will discuss exactly what has led your business to consider implementing a new, or improved solution, liaising in depth to discover the driving force for the business.

Designing

Following our complete understanding of the challenges or the resolution you’re aiming for we can discuss appropriate solutions.

Whether this be offering a resolution to assist an existing problem and advise of the changes that are required, or an original solution for something your business is looking to achieve.


Planning

When the design is agreed and your business is completely satisfied with our proposed solutions then contracts will be signed.

We will take full control of the project, liaising with both your business and any service providers who will carry out surveys and any external aspects such as line installations.

Supporting

We pride ourselves on our support contracts, which are tailored to meet your specific business requirements.

Our Support contracts cover Hardware Support, Software Support, Physical Security Support and Planned Preventative Maintenance.

Let’s DIScuss

Challenge DIS & we’ll create an integrated technology solution to solve your problems.

"*" indicates required fields

Newsletter Consent
To prove you're not a robot, please type in the characters below:
This field is for validation purposes and should be left unchanged.
Security Services

Network Access Control
Insights