Network Access Control Archives - IT Solutions Provider - IT Consulting - Technology Solutions /blog/topic/network-access-control/ IT Solutions Provider - IT Consulting - Technology Solutions Wed, 11 Mar 2026 15:24:39 +0000 en-US hourly 1 /wp-content/uploads/2025/11/cropped-favico-32x32.png Network Access Control Archives - IT Solutions Provider - IT Consulting - Technology Solutions /blog/topic/network-access-control/ 32 32 Transform Enterprise Security With Advanced Network Access Control Solutions /blog/transform-enterprise-security-with-advanced-network-access-control-solutions/ /blog/transform-enterprise-security-with-advanced-network-access-control-solutions/#respond Tue, 19 Nov 2024 14:17:00 +0000 https://dev.wei.com/blog/transform-enterprise-security-with-advanced-network-access-control-solutions/ Imagine managing a large party in your home, where guests arrive unpredictably through different entryways. You can’t just lock the front door and call it secure. Instead, you need to...

The post Transform Enterprise Security With Advanced Network Access Control Solutions appeared first on IT Solutions Provider - IT Consulting - Technology Solutions.

]]>

Imagine managing a large party in your home, where guests arrive unpredictably through different entryways. You can’t just lock the front door and call it secure. Instead, you need to keep track of everyone who enters, ensure they’re supposed to be there, and monitor the activity inside. In the same way, businesses face the complex challenge of managing network security across an expansive digital landscape. With remote work, a rise in connected devices, and growing cyber threats, ensuring effective business network security now resembles organizing a secure, multi-room event with hundreds if not thousands of “guests.”

For enterprise network security, network access control (NAC) serves as a security “host,” overseeing who and what enters the network. NAC solutions verify authorized access, flag potential threats, and enforce security policies to maintain a secure, smooth environment. In this article, we explore how modern NAC solutions elevate network security, enhance endpoint protection, and streamline access management across increasingly complex digital environments.

BYOD And IoT On The Rise

As business network security advances to meet the surge in IoT devices and the needs of a mobile workforce, we see that traditional firewalls and basic NAC solutions simply aren’t enough anymore. Today’s enterprise network security requires advanced NAC solutions to give us the visibility and control needed to secure network access, protect sensitive data, and stay compliant.

Let’s consider the impact of mobile and remote work. With mobile workers making up about that’s around 1.76 billion people worldwide, endpoint security is necessary. With IoT spending projected to grow at 10.4% annually from 2023 to 2027, the sheer number of connected devices is only increasing.

Yet, there’s a big challenge we need to address: endpoint monitoring. Many organizations admit struggling to monitor mobile devices when they leave the corporate network. This gap in monitoring presents a clear need for enterprise network security that extends to all endpoints, wherever they are. Comprehensive, ongoing monitoring is now essential for keeping our networks truly secure.

This expansion brings numerous enterprise network security challenges:

  1. Device diversity: Each device type, whether a smartphone or an industrial sensor, introduces unique security risks, often lacking standard enterprise-grade protections.
  2. Guest and contractor access: Outsiders such as contractors and vendors regularly need network access which creates potential vulnerabilities.
  3. IoT threats: IoT devices, frequently “headless” (that is, without user interfaces), lack the capability for basic security updates, making them frequent targets for cybercriminals.

Effective network security today requires more than just allowing or denying access. Modern NAC solutions need to deliver centralized visibility, rapid threat responses, and integrated controls across all connected devices.

Watch: Securing The Hybrid Workforce With SASE



The Need For Visibility, Automation, And Modern Controls

Traditional NAC solutions, which rely on simple scan-and-block techniques, fall short in meeting today’s security needs. For modern business network security requirements, organizations need NAC that goes beyond these outdated methods.

Key capabilities now essential for network access control should include:

  1. Comprehensive visibility: IT and security teams must have centralized visibility into every device, whether it’s a laptop, IoT device, or mobile phone, across all segments of the network. This visibility ensures that nothing enters or operates within the network without oversight.
  2. Automated threat responses: With the high volume of security alerts generated daily, manual responses are too slow and resource-intensive. Automated responses allow for immediate containment and mitigation of threats, minimizing potential damage and accelerating response times.
  3. Efficient device onboarding and workflow automation: Manual processes for provisioning and onboarding devices are time-consuming and prone to error. Automated workflows streamline these tasks, reducing wait times for new devices to join the network and minimizing risks from misconfigured or unidentified devices.
  4. Dynamic segmentation controls: To prevent lateral movement by potential attackers, NAC solutions must enforce policies that automatically segment and restrict access based on device type, user role, and behavior patterns. Dynamic segmentation protects sensitive data and systems from unauthorized access within the network.

by Fortinet addresses these needs with a policy-driven, automated solution that delivers comprehensive visibility, responsive containment, and seamless integration with the Fortinet Security Fabric. This platform empowers security teams to identify, authenticate, and control each device connection, strengthening enterprise network security across the organization and reducing risk from internal and external threats.

FortiNAC provides significant advantages in four core areas of network security:

  1. Lower total cost of ownership (TCO)
    FortiNAC offers a flexible and comprehensive network security solution designed to integrate seamlessly with existing infrastructure. The platform supports over 150 vendors, including switches, wireless devices, and firewalls. This compatibility helps businesses maximize their previous investments in network infrastructure, enhancing both endpoint and enterprise security. FortiNAC’s deployment options, available as a hardware appliance, virtual appliance, or cloud service, empower architects to choose configurations that best suit their organization’s unique needs.By using open standards, FortiNAC eliminates the need for a server at every location, enabling businesses to reduce costs by leveraging their existing network and security setups. These features make FortiNAC a versatile and adaptable choice for organizations looking to strengthen business network security and maintain a secure, well-integrated environment across the enterprise.
  2. Rapid deployment and scalability
    FortiNAC’s REST-based API enables rapid deployment and seamless bi-directional data exchange, making it adaptable to large-scale networks. Integrated within the Fortinet Security Fabric, FortiNAC serves as a third-generation network access control (NAC) solution that meets the complex demands of enterprise network security.Unlike earlier NAC solutions, which primarily authorize managed PCs and guest devices, FortiNAC enforces policies across distributed environments where dynamic access control is critical. With Security Fabric integration, FortiNAC identifies, validates, and segments every device on the network, enhancing both endpoint security and overall business network security. Additionally, FortiNAC prevents threat spread through granular access control, and ensures devices access only the resources aligned with their roles.
  3. Accelerated BYOD and IoT device integration
    FortiNAC integrates with existing EMM systems to streamline onboarding and validate BYOD and IoT devices, thereby enhancing endpoint security for mobile and remote workers. It delivers essential visibility and access control to secure a wide range of devices in BYOD and IoT-heavy environments.Through agentless scanning, FortiNAC automatically discovers, classifies, and verifies each device, by allowing only authenticated devices to connect. Role-based policies further enable precise control over device permissions and behavior, ensuring comprehensive enterprise network security and simplifying access management for organizations.
  4. Reduced containment time
    FortiNAC strengthens business network security by correlating user activity and network connections to detect and prioritize potential threats. Automation drives FortiNAC’s security architecture, enabling it to contain threats rapidly through real-time intelligence sharing within the Fortinet Security Fabric. This integration automatically enforces policies to safeguard network security and reduce risk. When a threat occurs, FortiNAC isolates compromised devices and notifies network administrators to improve endpoint security. This approach then helps businesses stay compliant with regulatory standards.

Final Thoughts

Maintaining security for a scheduled party means not only knowing who enters, but also keeping an eye on everyone’s activities to ensure each space remains safe and controlled. This is also the reality of modern business network security. With various devices constantly accessing enterprise networks, organizations need more than just basic network security.

FortiNAC from Fortinet exemplifies the kind of advanced NAC solution required to handle today’s enterprise network security needs. Offering policy-based automation and integrating with the Fortinet Security Fabric, FortiNAC provides businesses with detailed visibility, real-time control, and automated responses to potential threats across mobile, IoT, and remote endpoints.

For organizations looking to implement a reliable NAC solution, WEI offers expert guidance in FortiNAC integration so your business gains visibility, automation, and the confidence to face modern security challenges head-on. Contact WEI today to explore how FortiNAC can strengthen your enterprise network security and safeguard your organization’s future.

Next Steps: FortiAnalyzer provides automation-ready single-pane-of-glass management, transparent visibility, advanced compliance reporting, and network-aware rapid response across on-premises, cloud, and hybrid environments. The solution streamlines security operations and brings unparalleled value to modern security network management.

Talk to WEI about advancing your organization’s security posture by optimizing Fortinet Security Fabric with FortiAnalyzer. Download our free tech brief below.

The post Transform Enterprise Security With Advanced Network Access Control Solutions appeared first on IT Solutions Provider - IT Consulting - Technology Solutions.

]]>
/blog/transform-enterprise-security-with-advanced-network-access-control-solutions/feed/ 0
3 Key Takeaways From WEI’s Cybersecurity Webinar /blog/3-key-takeaways-from-weis-cybersecurity-webinar/ /blog/3-key-takeaways-from-weis-cybersecurity-webinar/#respond Tue, 24 Aug 2021 12:45:00 +0000 https://dev.wei.com/blog/3-key-takeaways-from-weis-cybersecurity-webinar/ Regardless of the subject, there’s no one better to learn from than the experts. With this thought in mind, we recently held a cybersecurity webinar featuring Kevin Mitnick, a famous...

The post 3 Key Takeaways From WEI’s Cybersecurity Webinar appeared first on IT Solutions Provider - IT Consulting - Technology Solutions.

]]>
cybersecurity webinar, cybersecurity strategy, WEI, HPE, AMD

Regardless of the subject, there’s no one better to learn from than the experts. With this thought in mind, we recently held a featuring Kevin Mitnick, a famous hacker and New York Times bestselling author, James Morrison, a Distinguished Technologist and a former FBI agent, and our own Greg LaBrie, an enterprise security industry veteran and our Vice President of Technology Solutions and Services.

The webinar titled “Hack Me If You Can!” is now available for , and it shared expert insights on key cybersecurity topics including:

  • Common threats and tactics used by today’s hackers
  • Which new technologies can improve your cybersecurity strategy
  • How to turn the tables on cyberattacks through offensive and defensive security strategies

In this article, we’ll share the top three takeaways from the webinar that you need to know to effectively combat today’s evolving cybersecurity threats.

1. Identifying Your Priorities Should Be The First Step In Your Cybersecurity Strategy

In the last year and a half, enterprises around the world have been faced with a substantial, new challenges. In terms of IT and cybersecurity, the exodus to remote working, maintaining that, and the evolution of the hybrid workspace has stretched enterprise security teams to the breaking point. Unfortunately, the bad guys know it and have no qualms about taking advantage.

According to a from INTERPOL, the rapid deployment of remote systems and networks allowed criminals to take “advantage of increased security vulnerabilities to steal data, generate profits and cause disruption.”

Even now, as some companies go back to the office and others delay in-person plans, or adopt a hybrid approach, cybercriminals are waiting for their opportunity to strike and these transitional periods are the perfect target.

In addition to the confusion and uncertainty created by the pandemic and the subsequent rise in cybercrime, companies are overwhelmed as they re-evaluate their security strategy and solutions as they begin to implement a more comprehensive cybersecurity strategy.

During the cybersecurity webinar, Greg LaBrie shared how the amount of enterprise security solutions on the market and the complexity of setting up security throughout an enterprise’s digital environment is making it hard for companies to determine their security priorities. As a result, many companies end up utilizing solutions that aren’t the best fit for their needs or leave vulnerabilities by neglecting to secure certain aspects of their digital environment.

“Don’t just buy any server, but look carefully at your server. Just don’t throw any solution out there, but really look at one of these confusing acronyms like ZTNA (zero trust network access). It means you have to have endpoint protection. It means you need to have multi-factor authentication. It means you need to have network access control and identity management,” Greg shared during the webinar.

“Put those solutions in place and also have a plan B. Have a backup. Have a way that if you do get ransomware that you can recover. That you don’t need to even be concerned about paying a ransom or the threat of paying ransom.”

2. Utilize Penetration Testing To Analyze Your Cybersecurity Strategy

Once your cybersecurity strategy is in place and you’re up and running, the next step should be to test for any vulnerabilities. That’s where ethical hackers like come in.

After getting himself into some hot water utilizing his talents in not-so-legal ways, Kevin eventually began operating a cybersecurity testing company and now helps enterprises determine areas of improvement in their defense strategy.

“I think penetration testing is absolutely necessary, because how do you know what weaknesses are in your security controls? How do you know that your network services aren’t exploitable? What about your web applications?” Kevin said during the webinar.

During the course of a penetration test, teams like Kevin’s make use of strategies that today’s hackers would utilize, using their creativity and expertise to determine how a cybercriminal could gain access and then, figure out what needs to be done to remove that vulnerability.

Sometimes it’s the simplest things that give cybercriminals the keys to your digital environment.

“I can’t tell you how many times organizations we tested that have all the privileged passwords sitting there on unencrypted Excel spreadsheets on the IT drive. And that’s the first place a bad actor is going to look.”

3. You Don’t Have To Go It Alone

Just like any other predator, cybercriminals want their prey scared and isolated. Thankfully, as it is in the animal kingdom, there is strength in numbers when it comes to cybersecurity.

New security guidance is coming out every day and sharing information is one way we can get ahead of bad actors.

For enterprises, another method is to work with a partner like WEI on your cybersecurity strategy.

As shared by James Morrison during the webinar, security is being built into tools that never had it before and while not every solution is going to fit your enterprise, by talking to your IT solutions provider, you can better determine what your cybersecurity needs are.

“Modernization is not just about us tech companies trying to sell the new gadget. There are new security features built into a lot of the things that we do. So, let’s have that conversation. Don’t just ignore it because you think we’re trying to pump a product. If it’s ransomware that bugs you, let’s talk about it. Let’s talk about ransomware avoidance, ransomware remediation, ransomware recovery. All of these things, but we’ve got to start with having that honest conversation. Can you afford $11 million for ransomware? Because if you think your insurance is going to protect you from it, that ship is sailing.”

Ensure a Comprehensive Cybersecurity Strategy With WEI

Having a trusted technology partner like WEI can help you build the right security foundation with secure tools like integrated with Processors, while walking you through a cyber-savvy strategy to identify vulnerabilities and take a proactive approach to risk mitigation.

NEXT STEPS: Watch the webinar for other cybersecurity pearls of wisdom as you take a closer look at strengthening your own security posture. You can also sign up for a one-on-one .

The post 3 Key Takeaways From WEI’s Cybersecurity Webinar appeared first on IT Solutions Provider - IT Consulting - Technology Solutions.

]]>
/blog/3-key-takeaways-from-weis-cybersecurity-webinar/feed/ 0
3 Reasons Why NAC Should be Part of your Networking Strategy /blog/3-reasons-why-nac-should-be-part-of-your-networking-strategy/ /blog/3-reasons-why-nac-should-be-part-of-your-networking-strategy/#respond Thu, 10 Jan 2019 13:45:00 +0000 https://dev.wei.com/blog/3-reasons-why-nac-should-be-part-of-your-networking-strategy/ Securing the enterprise is an evolving challenge today. In order to effectively manage today’s enterprise, you must be able to draw a complete picture of everything connected to your network....

The post 3 Reasons Why NAC Should be Part of your Networking Strategy appeared first on IT Solutions Provider - IT Consulting - Technology Solutions.

]]>
network-access-controlSecuring the enterprise is an evolving challenge today. In order to effectively manage today’s enterprise, you must be able to draw a complete picture of everything connected to your network. Enterprises are implementing a Network Access Control solution (NAC) to identify, assess, and enforce access control on any and all devices before they connect to the network. A NAC solution provides the basic necessity of knowing what devices IT is tasked with securing. A NAC solution can identify and profile each subsequent device wanting to connect, as well as:

  • Perform health check assessments
  • Enforce access control policies
  • Conduct remediation tasks in many cases

BYOD

NAC is most commonly perceived as a solution for bring your own device (BYOD) environments. While there are other applications for NAC, there are good reasons why it is used for BYOD. NAC solutions are usually associated today with BYOD environments because users regularly bring external devices into the enterprise, consider a higher educational institution. is the leading NAC solution today that provides a self-service portal that guides users through the process of connecting personal or non-enterprise devices without IT involvement or intervention.

IoT Devices

But the need for NAC solutions such as ClearPass exceed far beyond BYOD environments. It isn’t just mobile that is rapidly increasing the attack surfaces of enterprises today. It’s also those little black box like devices that are cropping up throughout companies and organizations, otherwise known as IoT devices. These non-standardized devices are difficult to identify because there are so many types of devices and they’re manufactured by so many different vendors. And then there is the issue of security, of course! According to Peter Newton, senior director of product marketing at Fortinet, “Many IoT devices are inherently untrustworthy because they weren’t designed with security in mind due to their low cost.” He goes on to refer to them as “headless,” meaning that these devices often lack any authentication or methodology to log on to the device. As a result of companies deploying so many IoT device types throughout their networks at an accelerating pace, companies such as Aruba, Fortinet and Cisco have introduced next generation NAC solutions that are designed to accommodate device conglomerations of all types, IoT being one of them.

There is no doubt that IoT devices are a different breed of device and concern about their inherent vulnerabilities is a legitimate concern in the IT community. According to a survey posted in CSO Magazine in September of 2018, only 10 percent of IT managers reported being fully confident that they knew all of the IoT devices on their networks. An alarming 64 percent responded that they either had no level of confidence or very little. In a recent Ponemon Institute’s report concerning the era of IoT and the security gap it contributes to, 66 percent of respondents say their organizations are unable to or have a low ability to secure their IoT devices and apps. Only 24 percent of respondents say their organization’s IoT devices are appropriately secured with a proper security strategy in place. More than half stated that visibility was essential for detecting attacks and 41 percent said that NAC is important for addressing IoT risks.

Both and ClearPass each have NAC solutions that use “collectors” in order to discover all endpoints on your network rather than relying on a database or endpoint agents. These collectors or data sources include but are not limited to RADIUS, SNMP, DHCP and LDAP. An example of the many data sources that uses is shown below.

Both ClearPass and FortiNAC then create profiles for each device in order to identify, categorize it and even create separate security domains for them. This ability to segment IoT devices increases the security of the network and therefore the confidence in the enterprise. With a NAC solution, the issues of who, when, where and how IoT devices are connect to your network are no longer unanswered questions. NAC goes beyond adding clarity and visibility however. NAC also conducts pre and post connection assessments of all access controlled devices according to policies that enforce security measures in dynamic fashion according to slated criteria.

Traditional Networks

Although mobile and IoT devices get most of the focus when discussing NAC, solutions such as Aruba ClearPass are ideal for securing wired traditional networks as well. Rather than using the cumbersome process of MAC filtering in order to secure switch ports, ClearPass uses a single RADIUS 802.1x authentication solution to ensure that only authorized devices and users can connect to your network drops. Today’s NAC solutions can provide visibility into your VPN connections as well, identifying remote devices to better secure your network.

Conclusion

The concept of access control may seem overly simple and old fashioned, but keeping intruders and unauthorized parties out is at the core of any type of security strategy. The concept of NAC today is the same as it was more than a decade ago, yet the justification and rationalization for implementing a NAC solution is even more relevant today. You could say that NAC is back, a proven technology that is ideally suited for today’s mobile and IoT environments. Talking to a technology partner like WEI can help organizations get started with NAC.

Next Steps: Sign up for a that covers RF coverage maps, RF analysis, capacity plans, channel plans, access point installation recommendations, and more!

The post 3 Reasons Why NAC Should be Part of your Networking Strategy appeared first on IT Solutions Provider - IT Consulting - Technology Solutions.

]]>
/blog/3-reasons-why-nac-should-be-part-of-your-networking-strategy/feed/ 0
Aruba ClearPass – Profiles, Health checks, Segmentation, and more /blog/aruba-clearpass-profiles-health-checks-segmentation-and-more/ /blog/aruba-clearpass-profiles-health-checks-segmentation-and-more/#respond Thu, 15 Nov 2018 13:15:00 +0000 https://dev.wei.com/blog/aruba-clearpass-ae-profiles-health-checks-segmentation-and-more/ Recently I was talking to the network manager of a school district in Georgia. The district had just experienced a large scale malware attack. It started in the transportation department,...

The post Aruba ClearPass – Profiles, Health checks, Segmentation, and more appeared first on IT Solutions Provider - IT Consulting - Technology Solutions.

]]>
Aruba-ClearPassRecently I was talking to the network manager of a school district in Georgia. The district had just experienced a large scale malware attack. It started in the transportation department, which had refused to let go of some outdated machines that were susceptible to the EternalBlue windows vulnerability, made famous by the WannaCry and NotPetya malware encryption attacks last summer.

Several Trojans then took advantage of the web of shared files, spreading cryptocurrency-mining malware throughout the department. Bank Trojans were then introduced and soon an administrator password was recorded and compromised. The virus began proliferating throughout the school system, taking advantage of devices that were behind in their endpoint protection updates. As the school has a successful one-to-one program that boasts more than 13,000 laptops, the virus had a lot of potential targets. Slowly and methodically, the virus grew, consuming the processing power of servers and client devices, capturing account credentials as users interacted with the machines. By the time the full ramifications of the virus had come to light, the only available option was to bring in additional resources to clean servers and reset or re-image workstations.

The district’s enterprise infrastructure consisted of hundreds of Aruba switches along with Aruba Instant Access Points. It’s just too bad they didn’t have ClearPass to complement and secure the enterprise. Many people associate as a system to onboard and authorize BYOD and guest devices. Others know it as a (NAC) solution. While those are important components of Aruba ClearPass, that sell this multifaceted solution well short. ClearPass is a policy management platform that gives you broad visibility throughout your enterprise and offers a suite of tools to protect your networks and the infrastructure that supports it.

Identifying what is on your network

One problem for the school district was the inability to know what exactly was on its network. While the IT staff was able to discern through SCCM logs where the virus started, often times, organizations simply have no idea. Was the malware introduced through a domain joined device, guest device, or smart phone that was anonymously brought in? Anonymity is a thing of the past with ClearPass because every device is required to check in and identify itself, whether connected via wired, wireless, or VPN. Access control policies then state whether a device can be joined or not. All of this is performed in automated fashion requiring little IT involvement. With Aruba ClearPass, you always know what and who is connected to your network with near little time invested.

Creating profiles for all of your devices

Once connected, a profile is created within ClearPass for every device. In this case, the IT department would have been reminded every day about the outdated operating systems that were vulnerable to the EternalBlue exploit. They would have known about the operating systems, hostnames and MAC addresses of each and every device on the network. A built-in certificate authority issues certificates to then identify and reconnoiter all devices while connected.

Health Checks and Posture Assessments

Malware only requires a minimal window of vulnerability to infect a network and spread. This is why it is so imperative that all connected devices are up-to-date when it comes to endpoint and operating system updates. In organizations with thousands of devices, how do you know if they are all in compliance or not? With Aruba ClearPass, there is no more uncertainty involving outdated systems. Every time a device attempts to connect, it is checked for all security criteria set forth by your IT department. This includes minimum standards concerning endpoint protection, updates and firewall activation. This is done through the use of persistent or dissolving agents that support both auto and manual remediation. ClearPass then continues to perform health checks and posture assessments in order to identify weak and vulnerable devices because it only takes one exploited device to bring down your entire network.

Segmentation

Although this malware attack infiltrated domain joined devices from the start, it is your guest network that is the most vulnerable. But how do you segment your guest network without a complicated conglomeration of VLAN switch port assignments and AP access control lists? Well, with ClearPass, VLAN segmentation is done dynamically with little configuration. All devices residing in the guest category are automatically sectored into a separate VLAN that is routed straight to the internet without complicated manual configurations. Referred to as “colorless ports,” devices are assigned to VLANs according to enforced policies, not static port placement.

Wired 802.1x Authentication

Although ClearPass is correctly associated with , it provides important management and security features for wired workstations, servers, and IoT devices as well. ClearPass incorporates 802.1x authentication methods so that the only wired computers that can gain access to your network are the ones that have LDAP or similar accounts. Wired devices can then be assigned policies as well.

Protect your dynamic enterprise network of devices

ClearPass is the policy management platform you need to identify, enforce, and protect your network devices. There is nothing static about your network, so why would you continue to depend on static-based configuration tools and methods to manage it? We can never know if ClearPass could have prevented the malware attack mentioned earlier, but it would have given IT the information and reconnaissance about their devices to have at least contained it.

Next Steps: Talk to the Aruba experts at WEI to better understand how a solution like ClearPass can benefit your business. As an award-winning IT solutions provider, WEI can perform a to detect how well your current wireless solution is performing and can help identify any gaps in coverage. Click below to learn more and get started with an assessment.

The post Aruba ClearPass – Profiles, Health checks, Segmentation, and more appeared first on IT Solutions Provider - IT Consulting - Technology Solutions.

]]>
/blog/aruba-clearpass-profiles-health-checks-segmentation-and-more/feed/ 0
Secure the Edge: 5 FAQs About Aruba ClearPass /blog/secure-the-edge-5-faqs-about-aruba-clearpass/ /blog/secure-the-edge-5-faqs-about-aruba-clearpass/#respond Thu, 25 Oct 2018 12:15:00 +0000 https://dev.wei.com/blog/secure-the-edge-5-faqs-about-aruba-clearpass/ Today’s workers are experiencing more freedom thanks to the explosive adoption of mobile devices in the enterprise. However, with an increasing amount of devices connecting to the network, IT administrators...

The post Secure the Edge: 5 FAQs About Aruba ClearPass appeared first on IT Solutions Provider - IT Consulting - Technology Solutions.

]]>
Aruba-ClearPass-network-securityToday’s workers are experiencing more freedom thanks to the explosive adoption of mobile devices in the enterprise. However, with an increasing amount of devices connecting to the network, IT administrators now have an overwhelming amount of information to monitor, and most of the time there are gaps in visibility to all of the devices trying to connect to the network. Aruba Clearpass offers your IT department a way to protect your data while allowing authorized users the ability to access information on the go or in the office.

Before we dive into some frequently asked questions about ClearPass, it will be beneficial to discuss some of the misconceptions between wired and wireless networking out there. Wired is a very challenging thing to do, given that you have open ports out there. Anybody that walks into your environment can just plug in, making it important to secure the wire. is much easier, because the wireless is just one component controlling the entire wireless. With a wired connection, there are different switches, ports, and they all have to be identified compared to wireless access. With ClearPass, this identification process can be accomplished more easily. We’re able to understand or communicate with most of the major vendors out there, so that makes it easier to really authenticate any devices connecting through any type of switch out there. It isn’t even necessarily authenticating the switches, but ClearPass can also act as a TACACS server. If the user admin’s, or the IT admin’s, trying to get into a switch, we can securely provide access into those switches, either at its full access, or read-only access.

Does Aruba ClearPass integrate well with other solutions?

One of the main benefits of ClearPass is that it plays well with other technologies and systems. Nowadays many environments are not comprised of solutions from just one vendor. You may have a Cisco switch, a Palo Alto firewall, and of course you want to make sure that any product you put in your environment will be able to communicate and exchange information with all the different components. There is no such thing as vendor lock-in, you are essentially future-proofing your investment with ClearPass.

ClearPass is very flexible and it can do a lot. In fact, most customers are not currently using ClearPass to its full potential. IT teams can authenticate devices from a wireless, wired, or even from a remote VPN perspective. With VPN, you can authenticate it against most major vendors out there too, such as Juniper, Avaya, Cisco, Fortinet, etc. Talk to a trusted IT solutions provider and you will realize it is tough finding vendors ClearPass doesn’t cover from an integration perspective.

2. How can I see IoT devices on my network?

Just because you can’t see it doesn’t mean it’s not there! Many companies have no idea what’s out there when it comes to smart devices. ClearPass can identify all those wired and wireless devices, including . Companies have experienced numerous security issues with IoT devices and ClearPass can dynamically profile (with different mechanisms to profile devices) and that profile information can be used to determine what type of policy or access that device should have while connected to your network.

If the appropriate profile information is provided, it becomes quite easy to determine what is out there on the network. Different policies can then be applied to any device, including IoT devices such as a printer. For example, that process would identify the device as an actual printer and then send a VLAN or an access list to segment that particular printer from the network. This device would be segmented differently than a laptop or a phone. The key takeaway with this is that every port can be treated the same way. Aruba refers to this as “dynamic segmentation.” With dynamic segmentation, it doesn’t matter which port is being connected because different access policies can be assigned anywhere in the environment.

3. How can ClearPass provide to guests?

It’s important to understand there are different types of methods for authenticating devices. is able to do this very well. ClearPass is able to authenticate devices using 802.1X certificate-based authentication and is also able to authenticate devices using captive portal. This is a very customizable module where the captive portal page can be made with different fields. For example, if a user gets into the environment and they’re trying to get guest access, a sponsor type of access can be provided. In this instance they will need to provide the email of the person that they’re visiting in order to get access to the network enabling organizations to securely allow visitors to get guest access to the network.

Another method for this can be accomplished by having the front desk create an account for the user that will only be valid for a certain amount of time, whether the guest needs access for a day, week, or longer, depending on how long that user will be onsite.

4. How does Aruba ClearPass address challenges with BYOD?

BYOD is a clear point of emphasis for ClearPass capabilities. ClearPass allows for self-service on-boarding which allows users to onboard their own devices to the network. ClearPass can generate a unique certificate, which can be used to then revoke access into the network if the device is misbehaving.

4a. How does Aruba ClearPass the address the unique challenges of BYOD in a college campus environment?

Students are bringing more devices to their college dorm than ever before. Outside of the expected devices, like an mobile phone and laptop, students are trying to connect video game consoles, Amazon Alexas, smart TVs and devices, tablets, and more. Many of these devices are not able to perform 802.1X authentication. For many of those devices there is no way that a username and password can be entered to get those devices connected to the network. This is a concern for many IT professionals on college campuses because in a lot of institutions the standard process is that a student goes to the IT help desk to register a device. This is not an efficient process, and it certainly doesn’t scale very well.

With ClearPass, a workflow can be created to present a page to students to self-register and manage their own devices. If the student wants to provide access to another student or somebody else in their dorm they can actually do that as well. Students can manage and register their own devices, and IT/network administrators can prevent other users from being able to see those devices on the network. Users have the capability to control and provide access to whoever they want. IT administrators can also identify those devices and can assign the correct access policy into the network as well need be. This puts the power in the hands of the users.

5. How can I tell if the devices on my network are secure?

It’s great that ClearPass can provide you the visibility needed to see all of the devices on the network, but how do you really know if any of those devices have already been compromised? Which devices have vulnerabilities that could be exposed once they are on your network? ClearPass can check the health of each device. It can check, for example, if the device is running an antivirus, or whether it’s running the latest version of the antivirus, the same way an IT administrator can check whether a laptop is running the latest Windows updates. Before the device is granted access, the IT team can ensure the device meets the security requirements set by the organization. At this point ClearPass enables this feature for Windows, Macs, and Linux devices. This ensures that security strategies are being implemented correctly, and the monitoring aspect provides you that level of visibility needed to be confident your network is secure.

Conclusion

Typically, networking and security teams are the two main drivers of adoption for Aruba ClearPass, but more often than not, it’s security. At the end of the day, it’s about the visibility and security at the edge. You want to understand what’s out there. You want to make sure that devices are getting the proper access. You don’t want an IoT device to be on the same VLAN as your trusted laptops. With ClearPass you can identify, classify, and enforce.

It’s also important to note that Aruba ClearPass is pretty hot right now in all verticals, purely based on the success stories companies are experiencing after deployment. The solution is so flexible that is can meet the needs of even the most unique needs at a wide-range of companies. At WEI, we are currently implementing Aruba ClearPass in healthcare and hospitals, financial services, higher education, etc. At the end of the day, Aruba ClearPass is about securing the edge and being able to exchange information with what you already have in place, meaning you don’t have to go and invest in other solutions to get things working, which is always a big win for the IT team and the CFO.

Next Steps: Talk to the Aruba experts at WEI to better understand how a solution like ClearPass can benefit your business. Ask us about a as well to find out how well your current wireless solution is performing and to help identify gaps in coverage.

The post Secure the Edge: 5 FAQs About Aruba ClearPass appeared first on IT Solutions Provider - IT Consulting - Technology Solutions.

]]>
/blog/secure-the-edge-5-faqs-about-aruba-clearpass/feed/ 0