A method of bolstering the security of a proprietary network by restricting the availability of network resources to endpoint devices that comply with a defined security policy. This includes laptops, smartphones, tablets, and other devices. It functions by carrying out a series of checks on each device as it connects to the network, determining its security posture and compliance status before granting it the appropriate level of access.
« Back to Glossary IndexNetwork Access Control (NAC)
« Back to Glossary Index