Feeds

NAC's looming identity crisis

Will persistence pay off for NAC vendors?

Remote control for virtualized desktops

Current network access control (NAC) technologies are not persistent enough, a security vendor has warned.

Dominic Wilde, product management veep at Nevis Networks, said that most NAC schemes rely on out-of-band appliances which check whether a client device is "clean", and once it passes muster they grant it access.

This makes them easier to install and remove, but he said it also means that once a client has been approved, there's no further control over where the user can go on the network or what they can do there.

"The first thing you need in the security world is to be stateful, so you understand the request going out and marry it to the response coming back," he said.

The second, he added, is to persistently track the user's identity: "Networks are by nature anonymous - you have MAC and IP addresses, but that's meaningless when customers are trying to solve compliance issues of who has access to what and when."

Needless to say, Nevis's security gear doesn't suffer this flaw, Wilde claimed. It sells an in-line security appliance and a secure access switch, both of which have built-in logic capable of controlling what the user can do and where they can go on the network. It also doesn't need agent software on the client to ensure it stays clean, he said.

Speaking as Nevis opened its UK office this week and began recruiting resellers for its devices, Wilde added that part of the problem is that most NAC technology operates at Layer 2 - the switching layer - using techniques such as virtual LANs to quarantine infected PCs.

"People are taking technologies designed for networking and applying them to security, and that's not what they're designed for," he said. Instead, they should work at Layers 3 and 4 - the routing and TCP layers - drawing user information from the corporate directory and using it to create an access policy for each user, he added.®

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
Turnbull should spare us all airline-magazine-grade cloud hype
Box-hugger is not a dirty word, Minister. Box-huggers make the cloud WORK
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
Do you spend ages wasting time because of a bulging rack?
No more cloud-latency tea breaks for you, users! Get a load of THIS
prev story

Whitepapers

Seattle children’s accelerates Citrix login times by 500% with cross-tier insight
Seattle Children’s is a leading research hospital with a large and growing Citrix XenDesktop deployment. See how they used ExtraHop to accelerate launch times.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Website security in corporate America
Find out how you rank among other IT managers testing your website's vulnerabilities.