{"id":4006,"date":"2017-02-06T00:17:42","date_gmt":"2017-02-06T00:17:42","guid":{"rendered":"http:\/\/www.abrahamsconsulting.com\/blog\/?p=4006"},"modified":"2017-02-06T00:32:00","modified_gmt":"2017-02-06T00:32:00","slug":"network-access-control-objections","status":"publish","type":"post","link":"https:\/\/www.abrahamsconsulting.com\/blog\/network-access-control-objections\/","title":{"rendered":"3 Network Access Control objections: a.k.a &#8216;alternative facts.&#8217;"},"content":{"rendered":"<p>I have heard my share of Network Access Control objections (NAC), but these three (3) have a following; a movement of sorts:<a href=\"http:\/\/www.abrahamsconsulting.com\/blog\/network-access-control-objections\/dreamstime_s_28842766\/\" rel=\"attachment wp-att-4111\"><img fetchpriority=\"high\" decoding=\"async\" class=\"alignright size-medium wp-image-4111\" src=\"http:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2017\/02\/dreamstime_s_28842766-300x167.jpg\" alt=\"Network Access Control Objections\" width=\"300\" height=\"167\" srcset=\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2017\/02\/dreamstime_s_28842766-300x167.jpg 300w, https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2017\/02\/dreamstime_s_28842766-768x426.jpg 768w, https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2017\/02\/dreamstime_s_28842766-358x200.jpg 358w, https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2017\/02\/dreamstime_s_28842766.jpg 800w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<ol>\n<li>&#8220;We have a firewall-so we don&#8217;t need to worry about NAC.&#8221;<\/li>\n<li>&#8220;Our wireless controller already has a built-in system like this.&#8221;<\/li>\n<li>&#8220;We already use Mobile Device Management\u00a0 (MDM) to ensure security of our devices.&#8221;<\/li>\n<\/ol>\n<p>There is nothing better than a movement for a worthy cause. Consider the <a href=\"http:\/\/bit.ly\/2kgNnlB\">Women&#8217;s march in DC<\/a>\u00a0on January 21, 1017?<\/p>\n<p>I stand with those women.<\/p>\n<p>However, the focus of this post, is Network Access Control objections.<em><a href=\"https:\/\/www.sans.org\/reading-room\/whitepapers\/analyst\/critical-security-controls-what-039-s-nac-it-35115\"><strong> [Further reading: Critical Security Controls:What&#8217;s NAC got to do with it].<\/strong><\/a><\/em><\/p>\n<p>The truth, \u00a0neither knows, nor has it e-v-e-r known\u00a0an\u00a0alternative, except, for its opposite&#8212;<\/p>\n<p><em>A Lie.<\/em><\/p>\n<p>There are, however,\u00a0 alternatives to Network Access Control, a.k.a \u00a0<a href=\"http:\/\/bit.ly\/2kD7207\"><em><strong>consequences to negligence and or poor decisions<\/strong>.<\/em><\/a><\/p>\n<p>Here are some considerations for the Network Access Control objections stated above:<\/p>\n<p>Firstly, even Next Generation firewalls cannot perform access control on guests or BYODs. They can only do so on managed\/Active Directory devices. Furthermore, firewalls are built to focus on the traffic coming in from the outside. The inside threat, an organization&#8217;s own users, pose the greatest risk to their network.<\/p>\n<p><em>Imagine that? \u00a0Your allies are also your enemies. A conundrum, if ever there was one.<\/em><\/p>\n<p>Secondly, NAC handles your wired and VPN networks as well. It also focuses on the enhancement of\u00a0 the devices on your network, in ways that wireless controllers do not. For example, can wireless controllers check for anti-virus software or can they check on OS patch level policies?<\/p>\n<p>And thirdly, Mobile Device Management\u00a0 (MDM) software will not ensure the security of your devices.<\/p>\n<p>Here are three (3) reasons why:<\/p>\n<ol>\n<li>\u00a0MDMs cannot take action on a device that is deemed a security threat?<\/li>\n<li>\u00a0MDMs will not address the Windows and OSx machines on your network?<\/li>\n<li>Have you considered the outcome if someone removes the MDM client from your phones, which would cause a blind spot? What policy do you have in place to address this occurrence?<\/li>\n<\/ol>\n<p>Are\u00a0 you now willing to vet Network Access Control solutions? If so, please <a href=\"mailto:agibson@abrahamsconsulting.com\">contact us. <\/a><\/p>\n<p>If not, consider the current<a href=\"http:\/\/ibm.co\/2l8FznJ\"><strong> Security Climate<\/strong><\/a>. Are you able to identify the <a href=\"http:\/\/bit.ly\/2fmiUNh\"><strong>Internet of Things (IoT) devices<\/strong><\/a> that connect to your network?<\/p>\n<p>Beyond these recommendations to implement a sound Network Access Control solution, &#8216;alternative facts,&#8217; <em>may<\/em> be the &#8216;right&#8217; alternative for you.<\/p>\n<p><em>Sources:\u00a0<\/em><\/p>\n<ul>\n<li><em><a href=\"https:\/\/www.sans.org\/reading-room\/whitepapers\/analyst\/critical-security-controls-what-039-s-nac-it-35115\">SANS Institute InfoSec Reading Room<\/a><\/em><\/li>\n<li><a href=\"http:\/\/bit.ly\/2kD7207\">How to get fired in 2017: Have a Security Breach<\/a><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I have heard my share of Network Access Control objections (NAC), but these three (3) have a following; a movement of sorts: &#8220;We have a firewall-so we don&#8217;t need to worry about NAC.&#8221; &#8220;Our wireless controller already has a built-in system like this.&#8221; &#8220;We already use Mobile Device Management\u00a0 (MDM) to ensure security of our [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":4111,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[158,1137],"tags":[171,293],"class_list":["post-4006","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-network-security","category-software","tag-byod","tag-nac"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>3 Network Access Control objections: a.k.a &#039;alternative facts.&#039; - TechTonic Times<\/title>\n<meta name=\"description\" content=\"Network Access Control Objections are many. Evaluate the ramifications of the excuses often given and how it affects the security of your organization.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.abrahamsconsulting.com\/blog\/network-access-control-objections\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"3 Network Access Control objections: a.k.a &#039;alternative facts.&#039; - TechTonic Times\" \/>\n<meta property=\"og:description\" content=\"Network Access Control Objections are many. Evaluate the ramifications of the excuses often given and how it affects the security of your organization.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.abrahamsconsulting.com\/blog\/network-access-control-objections\/\" \/>\n<meta property=\"og:site_name\" content=\"TechTonic Times\" \/>\n<meta property=\"article:published_time\" content=\"2017-02-06T00:17:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-02-06T00:32:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2017\/02\/dreamstime_s_28842766.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"444\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Angela Gibson\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Angela Gibson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/network-access-control-objections\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/network-access-control-objections\/\"},\"author\":{\"name\":\"Angela Gibson\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"headline\":\"3 Network Access Control objections: a.k.a &#8216;alternative facts.&#8217;\",\"datePublished\":\"2017-02-06T00:17:42+00:00\",\"dateModified\":\"2017-02-06T00:32:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/network-access-control-objections\/\"},\"wordCount\":425,\"commentCount\":1,\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/network-access-control-objections\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2017\/02\/dreamstime_s_28842766.jpg\",\"keywords\":[\"BYOD\",\"NAC\"],\"articleSection\":[\"Network Security\",\"Software\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.abrahamsconsulting.com\/blog\/network-access-control-objections\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/network-access-control-objections\/\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/network-access-control-objections\/\",\"name\":\"3 Network Access Control objections: a.k.a 'alternative facts.' - TechTonic Times\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/network-access-control-objections\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/network-access-control-objections\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2017\/02\/dreamstime_s_28842766.jpg\",\"datePublished\":\"2017-02-06T00:17:42+00:00\",\"dateModified\":\"2017-02-06T00:32:00+00:00\",\"author\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"description\":\"Network Access Control Objections are many. Evaluate the ramifications of the excuses often given and how it affects the security of your organization.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/network-access-control-objections\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.abrahamsconsulting.com\/blog\/network-access-control-objections\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/network-access-control-objections\/#primaryimage\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2017\/02\/dreamstime_s_28842766.jpg\",\"contentUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2017\/02\/dreamstime_s_28842766.jpg\",\"width\":800,\"height\":444,\"caption\":\"Network Access Control Objections\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/network-access-control-objections\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"3 Network Access Control objections: a.k.a &#8216;alternative facts.&#8217;\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\",\"name\":\"TechTonic Times\",\"description\":\"Security I Networking I Storage I IT Staffing I Managed Services\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\",\"name\":\"Angela Gibson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"caption\":\"Angela Gibson\"},\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"3 Network Access Control objections: a.k.a 'alternative facts.' - TechTonic Times","description":"Network Access Control Objections are many. Evaluate the ramifications of the excuses often given and how it affects the security of your organization.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.abrahamsconsulting.com\/blog\/network-access-control-objections\/","og_locale":"en_US","og_type":"article","og_title":"3 Network Access Control objections: a.k.a 'alternative facts.' - TechTonic Times","og_description":"Network Access Control Objections are many. Evaluate the ramifications of the excuses often given and how it affects the security of your organization.","og_url":"https:\/\/www.abrahamsconsulting.com\/blog\/network-access-control-objections\/","og_site_name":"TechTonic Times","article_published_time":"2017-02-06T00:17:42+00:00","article_modified_time":"2017-02-06T00:32:00+00:00","og_image":[{"width":800,"height":444,"url":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2017\/02\/dreamstime_s_28842766.jpg","type":"image\/jpeg"}],"author":"Angela Gibson","twitter_misc":{"Written by":"Angela Gibson","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/network-access-control-objections\/#article","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/network-access-control-objections\/"},"author":{"name":"Angela Gibson","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"headline":"3 Network Access Control objections: a.k.a &#8216;alternative facts.&#8217;","datePublished":"2017-02-06T00:17:42+00:00","dateModified":"2017-02-06T00:32:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/network-access-control-objections\/"},"wordCount":425,"commentCount":1,"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/network-access-control-objections\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2017\/02\/dreamstime_s_28842766.jpg","keywords":["BYOD","NAC"],"articleSection":["Network Security","Software"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.abrahamsconsulting.com\/blog\/network-access-control-objections\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/network-access-control-objections\/","url":"https:\/\/www.abrahamsconsulting.com\/blog\/network-access-control-objections\/","name":"3 Network Access Control objections: a.k.a 'alternative facts.' - TechTonic Times","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/network-access-control-objections\/#primaryimage"},"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/network-access-control-objections\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2017\/02\/dreamstime_s_28842766.jpg","datePublished":"2017-02-06T00:17:42+00:00","dateModified":"2017-02-06T00:32:00+00:00","author":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"description":"Network Access Control Objections are many. Evaluate the ramifications of the excuses often given and how it affects the security of your organization.","breadcrumb":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/network-access-control-objections\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.abrahamsconsulting.com\/blog\/network-access-control-objections\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/network-access-control-objections\/#primaryimage","url":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2017\/02\/dreamstime_s_28842766.jpg","contentUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2017\/02\/dreamstime_s_28842766.jpg","width":800,"height":444,"caption":"Network Access Control Objections"},{"@type":"BreadcrumbList","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/network-access-control-objections\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.abrahamsconsulting.com\/blog\/"},{"@type":"ListItem","position":2,"name":"3 Network Access Control objections: a.k.a &#8216;alternative facts.&#8217;"}]},{"@type":"WebSite","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website","url":"https:\/\/www.abrahamsconsulting.com\/blog\/","name":"TechTonic Times","description":"Security I Networking I Storage I IT Staffing I Managed Services","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad","name":"Angela Gibson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","caption":"Angela Gibson"},"url":"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/4006","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/comments?post=4006"}],"version-history":[{"count":0,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/4006\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media\/4111"}],"wp:attachment":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media?parent=4006"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/categories?post=4006"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/tags?post=4006"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}