Info-Tech Research Group1 Vendor Landscape: Network Access Control NAC is back, tell a friend. Info-Tech's products and services combine actionable insight.

Slides:



Advertisements
Similar presentations
Sage CRM awarded industry analyst awards. Sage CRM has been highly rated by recent industry analysts and awarded both a champion award and innovation award.
Advertisements

1Info-Tech Research Group Vendor Landscape: eGRC Solutions Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s.
1Info-Tech Research Group Vendor Landscape: Innovation Management Solutions Info-Tech Research Group, Inc. Is a global leader in providing IT research.
Practical IT Research that Drives Measurable Results Manage Help Desk Staffing 1Info-Tech Research Group.
1 1Vendor Landscape: Cloud File Sharing Info-Tech Research Group Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice.
1Info-Tech Research Group Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
1Info-Tech Research Group Vendor Landscape: Data Loss Prevention (DLP) Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice.
1Info-Tech Research Group Vendor Landscape: Business Process Management (BPM) Suites Info-Tech Research Group, Inc. Is a global leader in providing IT.
Info-Tech Research Group1 Headline / Subhead Vertical Spacing Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s.
1Info-Tech Research Group Vendor Landscape: Mid-Market ERP Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s.
Practical IT Research that Drives Measurable Results 1Info-Tech Research Group Get Moving with Server Virtualization.
Info-Tech Research Group1 V3.1 Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s products and services.
Plan for Application Consolidation. Successful application consolidation relies on assessment of the application portfolio to determine the best candidates.
Info-Tech Research Group1 Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
1Info-Tech Research Group Vendor Landscape: Server Virtualization Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice.
Info-Tech Research Group1 Info-Tech Research Group, Inc. is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
Info-Tech Research Group1 Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
1Info-Tech Research Group Vendor Landscape: Mid-Market Service Desk Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice.
Info-Tech Research Group1 Vendor Landscape: Secure Socket Layer Virtual Private Network (SSL VPN) Your workers are going remote, is your security?
Info-Tech Research Group1 Info-Tech Research Group, Inc. is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
Info-Tech Research Group1 Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
Info-Tech Research Group1 1 Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
Info-Tech Research Group1 Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
Info-Tech Research Group1 1 Info-Tech Research Group, Inc. is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
Practical IT Research that Drives Measurable Results Vendor Landscape Plus: Enterprise Content Management Suite ECM: A vendor marketing concept, not an.
Practical IT Research that Drives Measurable Results Vendor Landscape Plus: CRM Software 1Info-Tech Research Group.
Info-Tech Research Group1 Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
Info-Tech Research Group1 Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
1Info-Tech Research Group Vendor Landscape: Process-Generated Content Management (PGCM) Info-Tech Research Group, Inc. Is a global leader in providing.
Info-Tech Research Group1 Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
Info-Tech Research Group1 Info-Tech Research Group, Inc. is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
1Info-Tech Research Group Vendor Landscape: Thin Clients Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s.
1Info-Tech Research Group Vendor Landscape: Enterprise Mobility Management Info-Tech Research Group, Inc. Is a global leader in providing IT research and.
1Info-Tech Research Group Vendor Landscape: Social Media Management Platforms Info-Tech Research Group, Inc. Is a global leader in providing IT research.
1Info-Tech Research Group Vendor Landscape: Content and Archiving Info-Tech Research Group, Inc. is a global leader in providing IT research and.
Info-Tech Research Group1 Build a Case for Windows Server 2012 Hyper-V Hyper-V is a credible alternative and competitive threat to VMware for virtualization.
1Info-Tech Research Group Vendor Landscape: Enterprise ERP Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s.
1Info-Tech Research Group Vendor Landscape: Mid-Market Service Desk Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice.
1Info-Tech Research Group Vendor Landscape: Enterprise BI Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s.
1Info-Tech Research Group Vendor Landscape: Enterprise Wired and Wireless LAN Info-Tech Research Group, Inc. is a global leader in providing IT research.
1Info-Tech Research Group Vendor Landscape: Security Gateway Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice.
Info-Tech Research Group1 Make the Decision to Upgrade to Microsoft Exchange 2010 It’s Time for a Change: Let’s Talk about Exchange Info-Tech's products.
Info-Tech Research Group1 Vendor Landscape: Web Conferencing Vendors Hear me, see me, show me, teach me.
Build an IT Strategy for the Small Enterprise
Vendor Landscape: Application Lifecycle Management
Vendor Landscape: Enterprise Service Desk Software
Vendor Landscape: Security Information & Event Management (SIEM)
Vendor Landscape: ECM for Knowledge Workers (CMKW)
Vendor Landscape: Intrusion Detection and Prevention Systems
Vendor Landscape: Systems Management
Create a Consumer Technology Integration Plan in Five Steps
Vendor Landscape: Software Testing Solutions
Vendor Landscape Plus: IP Telephony Vendors
Vendor Landscape: Desktop Virtualization
Select the Right Vendor for Desktop Virtualization
Ensure Cloud Security in IaaS and PaaS Environments
Vendor Landscape: Mid-Market BI
Vendor Landscape: The Right eForms Solution
Create Data Strategies for the Small Enterprise
Gain Control of Cloud Integration Strategies Before they Float Away
Bridge IT and the Business with Business Architecture
Select an EA Tool Based on Business and User Need
Vendor Landscape: Hyperconverged Infrastructure
Improve Business Satisfaction by 10% Through Business Relationship Management Relationship management is the #1 driver of business satisfaction with IT.
Establish a Right-Sized Incident Management Process
Presentation transcript:

Info-Tech Research Group1 Vendor Landscape: Network Access Control NAC is back, tell a friend. Info-Tech's products and services combine actionable insight and relevant advice with ready-to-use tools and templates that cover the full spectrum of IT concerns.© Info-Tech Research Group

Info-Tech Research Group2 The scope of NAC is evolving. Evaluate the vendors that are keeping up with a rapidly changing technology. Introduction Enterprises seeking to select a NAC solution. Those with a NAC use case that may include: Managing guest access to the corporate network. Policy creation and enforcement based on user attributes, identity, role, endpoint compliance, or other. Monitoring and containment of threats to the network. Adopting BYOD friendly policies to enable user/private device integration. This Research Is Designed For:This Research Will Help You: Understand what’s new in the NAC market. Evaluate NAC vendors and products for your enterprise needs. Determine which products are most appropriate for particular use cases and scenarios.

Info-Tech Research Group3 Executive summary Info-Tech evaluated six competitors in the NAC market, including the following notable performers: Champions Cisco, with a strong NAC feature offering, Cisco is a top level wired and wireless infrastructure vendor with many benefits. Extreme, with the recent acquisition of Enterasys, Extreme is developing on Enterasys’ already strong feature offering, and expanding its own wired and wireless infrastructure. Value Award: Aruba, a newer player in the NAC market, Aruba is making growth on its strong offering while maintaining a low price point. Trend Setter Award: Juniper, an established networking vendor that champions open standards extending to its NAC product. 1.Visibility is as important as access NAC value is becoming more about who and what is connecting, rather than confirming a secure connection. User credential compromise or manipulation is inevitable. NAC products should not only control access, but provide visibility to detect suspicious activity when legitimate access is being maliciously used. 2.Embedded functionality NAC usage will grow over time, but some of the functionality that is enabled by NAC (e.g. access policy control) will become embedded within wired and wireless infrastructure access methods, eliminating some need for deployment of agents. 3.Pure play or big guy Want to avoid vendor lock-in? Consider a pure-play NAC vendor. However, be cognizant of strategic vendor opportunities with the large wired and wireless infrastructure vendors and your needs. Info-Tech Insight

Info-Tech Research Group4 Book a free guided implementation today! Info-Tech is just a phone call away and can assist you with your project. Our expert Analysts can guide you to successful project completion. For most members, this service is available at no additional cost.* Here’s how it works: 1. Enroll in a Guided Implementation for your project Send an to Or call and ask for the Guided Implementation Coordinator. 2. Book your analyst meetings Once you are enrolled in a Guided Implementation, our analysts will reach out to book a series of milestone-related telephone meetings with you and your team. 3. Get advice from a subject matter expert At each Guided Implementation point, our Consulting Analyst will review your completed deliverables with you, answer any of your questions, and work with you to plan out your next phase. This symbol signifies when you’ve reached a Guided Implementation point in your project. * Guided Implementations are included in most advisory membership seats

Info-Tech Research Group5 Book a Guided Implementation Today: Info-Tech is just a phone call away and can assist you with your evaluation. Our expert Analysts can guide you to successful technology selection. Here are the suggested Guided Implementation points for the NAC Vendor Landscape: Guided Implementation points in the NAC Vendor Landscape Section 1: Shortlist Assistance and Requirements Get off to a productive start: discuss the market space and how vendors are evaluated. Decide on which deployment option suits you best and narrow down the options based on customized requirements. Section 2: RFP and Budget Review Interpreting and acting on RFP results: review each vendor’s RFP responses and ensure the solution is meeting your needs. Discuss average pricing of solutions and what can fit into your budget. Section 3: Negotiation and Contract Review Purchase Optimization: review contracts and discuss best practices in negotiation tactics to get the best price for your solution. This symbol signifies when you’ve reached a Guided Implementation point in your project. To enroll, send an to or call and ask for the Guided Implementation

Info-Tech Research Group6 Market overview Network access control (NAC) was created by Cisco as a concept in 2003, and as an actual capability in It has always been a tool to perform a pre-connect assessment of devices before allowing them access to the network and precious internal resources. Over the years, NAC has come to include more capabilities, such as continuous vulnerability assessment and intrusion prevention. The use of NAC settled down as the value of pre- connect assessment became muted for most, given the complexity of the required architecture and its impact on performance. The proliferation of personal devices created a renewed value for access control. Employers needed a way for personal devices not to be “guests” while also centrally enforcing policies around access: NAC was back. NAC and MDM vendors began integrating their products to add peripheral security capabilities. An MDM presents the NAC solution with much greater visibility and information to define and edit access policies. The integration of peripheral security solutions is accelerating as the potential value realized from a connected security system becomes known. Several vendors provide bidirectional integrations so that NAC solutions can share data and create automated or controlled responses from these systems. The continued disruption in enterprise data centers due to accelerated movement to virtualized or cloud based platforms will change the scope of what a NAC solution must control. Data virtualization enables data pools to be dynamically delivered to applications, allowing for data movement across devices and the network. NAC solutions will adapt through increased user and role access being based on a multitude of inputs. NAC usage is expected to grow within the near future. In the long term, some NAC functions will become embedded within wired and wireless access methods and infrastructure, which will provide downward pressure on pricing. How it got here Where it’s going As the market evolves, capabilities that were once cutting edge become default and new functionality becomes differentiating. Endpoint baselining and profiling have become Table Stakes capabilities and should no longer be used to differentiate solutions. Instead, focus on threat reduction across heterogeneous environments and infrastructure requirements to get the best fit for your requirements.

Info-Tech Research Group7 Criteria Weighting NAC criteria & weighting factors Vendor is committed to the space and has a future product and portfolio roadmap. Strategy Vendor offers global coverage and is able to sell and provide post-sales support. Reach Vendor is profitable, knowledgeable, and will be around for the long term. Viability Vendor channel strategy is appropriate and the channels themselves are strong. Channel Implementing and operating the solution is affordable given the technology. Affordability Multiple deployment options and extensive integration capabilities are available. Architecture The end-user and administrative interfaces are intuitive and offer streamlined workflow. Usability The solution provides basic and advanced feature/functionality. Features Usability Architecture Affordability Product Vendor ViabilityStrategy Channel Reach Product Evaluation Criteria Vendor Evaluation Criteria

Info-Tech Research Group8 Table Stakes represent the minimum standard; without these, a product doesn’t even get reviewed If Table Stakes are all you need from your NAC solution, the only true differentiator for the organization is price. Otherwise, dig deeper to find the best price to value for your needs. The products assessed in this Vendor Landscape TM meet, at the very least, the requirements outlined as Table Stakes. Many of the vendors go above and beyond the outlined Table Stakes, some even do so in multiple categories. This section aims to highlight the products’ capabilities in excess of the criteria listed here. The Table StakesWhat does this mean? Access control and isolation of guests connecting to the network. Guest Provisioning Configuration and management of access policies. Policy Configuration Integration with LDAP and Active Directory. Directory Integration Authentication and access control for specific devices. Device Based Authentication What it is: Feature

Info-Tech Research Group9 Advanced Features are the capabilities that allow for granular market differentiation Info-Tech scored each vendor’s features offering as a summation of its individual scores across the listed advanced features. Vendors were given one point for each feature the product inherently provided. Some categories were scored on a more granular scale with vendors receiving half points. Help desk load reduction through end-user self- support and automatic remediation. Help Desk & Self-Service Remediation Mobile-specific features, such as native agents, self-service apps, and mobile interfaces. Mobile Centric Controls Determining status of a large variety of endpoint devices. Advanced Endpoint Baselining Identifying devices beyond desktop computers. Advanced Endpoint Profiling Advanced reporting engine, audit trailing, and data export. Advanced Reporting What we looked for: Feature Advanced FeaturesScoring Methodology For an explanation of how Advanced Features are determined, see Information Presentation – Feature Ranks (Stoplights) in the Appendix.Information Presentation – Feature Ranks (Stoplights)

Info-Tech Research Group10 Advanced Features are the capabilities that allow for granular market differentiation Info-Tech scored each vendor’s features offering as a summation of its individual scores across the listed advanced features. Vendors were given one point for each feature the product inherently provided. Some categories were scored on a more granular scale with vendors receiving half points. Post admission rechecking of approved device’s health status and continued rule compliance. Post Admission Rechecking Location based restrictions in conjunction with user based authentication. Location Based Restrictions Advanced authentication through identity, roles, and user attributes. User Authentication Threat monitoring, containment, and remediation, extending beyond rogue device detection and authentication. Advanced Threat Reduction What we looked for: Feature Advanced Features ContinuedScoring Methodology For an explanation of how Advanced Features are determined, see Information Presentation – Feature Ranks (Stoplights) in the Appendix.Information Presentation – Feature Ranks (Stoplights)

Info-Tech Research Group11 Info-Tech Research Group Helps IT Professionals To: Sign up for free trial membership to get practical solutions for your IT challenges Quickly get up to speed with new technologies Make the right technology purchasing decisions – fast Deliver critical IT projects, on time and within budget Manage business expectations Justify IT spending and prove the value of IT Train IT staff and effectively manage an IT department “Info-Tech helps me to be proactive instead of reactive – a cardinal rule in a stable and leading edge IT environment. - ARCS Commercial Mortgage Co., LP Toll Free: