NAC Enforcement Nedir?


Upon achieving full visibility, use NAC for granular policy enforcement to secure devices (managed and unmanaged including IoT devices) and users on the network. This will ensure compliance with industry regulations and corporate policies. Customers can leverage existing security infrastructure investments to achieve enhanced identity and device context or to enable automated mitigation. NAC solutions have a broad range of built-in and extensible policy templates. Categories to consider when building policies include:

• User roles

• Quarantine options

• Acceptable endpoint devices

• Time-of-Day

• Network segmentation