10.3. Summary

The following are key points from this chapter:

  • NAC/NAP functionality can be found in many products that aren't officially marketed as NAC/NAP solutions (for example, VPN technologies).

  • There are many different NAC/NAP solutions from many different vendors available today.

  • The number one question you should ask of a NAC/NAP solution is if it protects against the threats that you see to your organization (that is, mobile devices as they are mobile, unauthorized users, and so on).

Chapter 2 through Chapter 5 of this book can be used as a reference point to analyze potential NAC/NAP solutions for your organization.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.119.138.123