As I’ve announced earlier, during the P2P session I’m hosting at RSA on Endpoint Integrity and NAC, I’ll be releasing for the first time ever our Universal NAC Feature Model. The contents of which include a prettied-up version of our proprietary internal document outlining and describing the feature components of NAC (as described in my recent whitepaper Catching the Unicorn) as well as the vendor mechanics implemented by different solutions to offer those features.
If you’re at the P2P session, you’ll receive your very own copy. It can be used as a reference during discussions, but we won’t be specifically addressing the document during the session. It’s something for you to take home and enjoy. ;) If you’re not at the P2P session, you’ll see the contents at a later time here or through one of our media partners.
Universal NAC Feature Model overview:
This Universal NAC Feature Model is a guide with which an organization can model network access control (NAC) features from a variety of solutions and vendors. It provides a single platform for comparison and analysis of the features provided as well as a means to identify and describe the methods and execution of technology to offer those features. Many vendors offer the same features, but with drastically different methods. This guide serves as a single ubiquitous model with common verbiage to describe NAC offerings.
RSA Peer 2 Peer session details:
Session Title: Endpoint Security and Network Access Control in the Real World
Session Code: P2P-204B
Scheduled Date/Time: Wednesday, March 3 1:00 PM
Session Abstract: While current solutions have proven difficult to implement in the real world, the need for access control and network security continues to grow. Join this Peer2Peer session for a lively discussion of real world case studies, an exploration of technical roadblocks and a dive into vendor-specific solutions. Participants will be given a copy of the host’s proprietary Universal NAC Evaluation Framework document to reference and evaluate various technologies and solutions at a technical level.
Facilitator: Jennifer Jabbusch CISO, Network Security Specialist, CAD, Inc.
# # #