December 10, 2016
The reality is that no network, device, user or application can be "trusted" - at least, not by traditional NAC's definition. Modern applications don't respect the perimeter as they are routinely accessed and shared beyond the firewall.
Users often fail to adhere to security protocols, continuously introduce personal devices, utilize consumer-grade apps, and access corporate data from remote locations. For these users, the firewall doesn't exist. As enterprises add cloud services, Internet of Things, and other innovations, the perimeter of the firewall becomes less relevant than ever.
Webtorial® is a registered servicemark of Distributed Networking Associates. The Webtorial logo is a servicemark of Distributed Networking Associates. Copyright 1999-2015, Distributed Networking Associates, Inc.