Monday, March 11, 2013

Network Access Control: A Strong Resurgence is Underway

Security analyst firm the Ogren Group today released its vendor market forecast and market analysis security report Network Access Control: A Strong Resurgence is Underway.

To buy Ogren Group Security Reports or reprint rights please send mail to eric@ogrengroup.com.

Analyst Comment

The ability to detect and characterize users and devices connecting to the network, and enforce security policies based on real-time assessments, is a huge benefit for enterprises requiring security and compliance for mobile users. The NAC roots of segmenting guests and unhealthy endpoints from sensitive data is fueling growth with BYOD and wireless initiatives along with demands for continuous endpoint compliance.

The NAC market has not only revived, but is experiencing a strong resurgence - the Ogren Group estimated the market for Network Access Control products and services was $392 million in 2012, and predicts it will grow at a 22% CAGR to $1,061 million by 2017. Cisco, ForeScout, and Juniper combined represent over 70% market share and are the clear leaders in the NAC market.



Security Report Summary

The Ogren Group interviewed major vendors and security officers at large organizations in examining the Network Access Control market. This Security Report presents the features, market strategy, future directions, and recommended vendors for NAC. In addition to Cisco, ForeScout, and Juniper, the Security Report also profiles
Aruba, Bradford, StillSecure, and TrustWave. The report structure is:

Executive Summary
Overview
Economic Drivers of NAC Resurgence
Technical Drivers of NAC Resurgence
Noteworthy NAC Features
Noteworthy NAC Weaknesses
Selected Vendor Profiles
Network Infrastructure Vendors
Software Infrastructure Vendors
Independent Vendors
Niche NAC Vendors
NAC Roadmap
Conclusions
Enterprise Recommendations
Vendor Recommendations
Directions and Predictions

Upcoming Ogren Group Research in 2013

Firewall Analysis: Keep Application Paths Clear
Endpoint Security Advances: Protect Un-trusted Systems
BYoD: Security Answers the Bell
Incident Response Strategies: Detect and Act!
Virtualization Impact on Security: Is It a Game Changer?
Spotlight on Threat Intelligence: Get a Head Start on Threats

2 comments:

  1. Mr. Donovan is a well-respected technology editor. He covered the announcement of the NAC report here:

    http://www.fiercemobileit.com/story/byod-spurs-resurgence-network-access-control-market-says-ogren/2013-03-27

    Mobility is the number one issue for security teams controlling access to the network.

    ReplyDelete
  2. This comment came in Anonymously. Normally those don't make it too far, but this does not appear to be spam.

    I like Eric's commentary as it relates to NAC being a complementary control and a control enabler.

    NAC has real-time visibility to BYOD devices, that are unmanaged, and corporate managed devices, where host-based controls are often inactive, out-of-date, corrupt or non-existent. In both cases, the corporation is blind to the actual security and management posture of the device. NAC can not only assess and remediate the endpoint, but can initiate enrollment to application or a process based on applying policy against captured attributes.

    The assumption of better security with VDI systems and that there would be no affect on user experience for remediation is not the case with enterprises we have worked with. A policy violation triggering an action would be similar for VDI and non-VDI endpoints - and such actions are still pre and post network admission. There is also the presumption that all NAC enforcement needs to be disruptive - this too is not the case and NAC enforcement / on NAC and VDI work well together

    ReplyDelete