Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

Using NAC to deploy managed diversity model

ForeScout Technologies : 25 April, 2016  (Technical Article)
ForeScout explores the Gartner managed diversity model and explains how NAC deployments can be used to manage BYOD deployments
Using NAC to deploy managed diversity model

In a series of blog posts, ForeScout's Product Manager, Kevin Mayer gives an overview of the Gartner "Managed Diversity Model" for securing Bring Your Own Device (BYOD) environments at different levels and explains how Network Access Control technology can be used to support the model and ensure the right level of security in all cases.

The Gartner model describes three levels of BYOD service that employees in an organisation can be provided with. The fully managed device service level is the most traditional and easiest service level that can be implemented. In this case the organisation's IT department has full control over all devices issued to employees and their access levels.

The user control level provides employees with full choice over which devices they purchase and bring into the workplace or connect to workplace networks. This level represents the most challenging environment for IT security professionals.

The third level described by Gartner is a mixed environment or semi-managed service offering where the responsibilities for securing user devices are split between the IT department and the user, an offering that has its own complexities.

Kevin Mayer goes into each of these environments in his series of blog posts and explains how the ForeScout CounterACT Network Access Control product provides IT security professionals with the ability to deploy any of these managed services without compromising the security of the corporate network and without committing themselves to challenging and complex management tasks.

You can also read about the Gartner model on the ForeScout site.

Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo