The SecurEdge Blog

Helping businesses provide secure WiFi by sharing insights into WiFi design, network security, installation, and troubleshooting. You've got questions, we have answers.

Topic: Network Access Control

Do You Need Network Access Control? 10 Questions To Ask Yourself
Mobility Security

Do You Need Network Access Control? 10 Questions To Ask Yourself

Mobile devices are an indispensable tool in both our personal lives as well as our professional lives today. With an endless amount of new applications and devices coming out every year, employees, guests, students, faculty, administrators etc expect to be able to use their mobile devices to access the network from anywhere at any time. With many IT departments being outpaced by user demand, they need an answer to help them keep up. 

Read More
5 Ways Campus IT Manager's Can Boost Performance and Security Using NAC
Mobility

5 Ways Campus IT Manager's Can Boost Performance and Security Using NAC

Every college and university IT department today is trying to effectively deliver access to their network  when using a mobile device. Whether its a laptop, smartphone, tablet, or wearable, and whether its owned by the school or not, the growing expectation from both employees, students and guests is that they should (in-truth demand) have the ability to access the campus Wi-Fi network no matter what device they're using, no matter where they are located.

Read More
How Healthcare IT Can Solve Today’s Mobility and Access Challenges
Security

How Healthcare IT Can Solve Today’s Mobility and Access Challenges

Did you know that 80% of healthcare facilities employ traveling nurses, and that doctors today are more like independent contractors working at multiple hospitals in their local regions? Combined with the staggering growth of connected devices (BYOD and IoT), tougher regulations, and increasing competition, healthcare IT teams are faced with some serious security problems.

Read More
4 Smart Ways To Secure Guest Wireless Access To Your Business Network
Security

4 Smart Ways To Secure Guest Wireless Access To Your Business Network

Many businesses today are scrambling to support the increasing demand for safer and faster guest wireless access to their networks. Wifi users today expect a certain level of access, you can't just throw up some access points anymore and call it a day, you need to deliver an experience to your users that enables mobility and security for both them and your organization.

Read More
5 Lesser-Known Benefits Captive Portals Offer Your Guest Wi-Fi Network
Security

5 Lesser-Known Benefits Captive Portals Offer Your Guest Wi-Fi Network

Castles have moats. Subways have turnstiles. Even houses have doors. When you have something people want, you need to control who has access to it. For many businesses and organizations offering guest wireless access, having a captive portal can play a major role in your overall mobility strategy, not only for network security reasons but for many other lesser-known benefits as well.

Read More
3 Ways to Use NAC to Support Your School Wireless Network Strategy
Security

3 Ways to Use NAC to Support Your School Wireless Network Strategy

Many teachers worry about the same thing, how do they securely use new mobile technology in the classroom? I come from a long line of teachers. My mother was a teacher, my sister is a teacher, and even both of my sister-in-laws are teachers. As they sit around and gab about how times have changed, a reoccurring theme arises; technology. “Technology” is the new buzz word in schools. It is seemingly as common of a word as “vanilla lattes” ordered at Starbucks; ever present and ever growing. Whether they fear the rise of technology in the classroom or not, they know it is going to be implemented sooner rather than later. Yet, they all worry about the same things, how will they securely allow students to roam the web in class? How will they and their schools adhere to the CIPA regulations put in place?

Read More
Top 3 Ways to Securely Deploy Technology in the Classroom
Security

Top 3 Ways to Securely Deploy Technology in the Classroom

One of the most important topics we speak to a lot of schools about almost every day, is how to safely implement mobile technology in the classroom. Most schools want to allow their students the world of possibility mobile classroom technology solutions can bring yet the fear of security breaches, misused tablet use (social media & gaming) and network overload leave them hesitant to jump into the world of mobility.

Read More
5 Features Network Access Control Solutions Must Have to Support BYOD
Security

5 Features Network Access Control Solutions Must Have to Support BYOD

Network Access Control or NAC solutions have been around for years but have never really been adopted by most IT organizations out there. The reason most IT Managers never really jumped onto the NAC band wagon is because most of their machines were windows domain machines that they owned and controlled. This meant that they could already manage the end device with just the set of windows tools (group policy and network access protection).

Read More
3 Reasons why Wireless Network Design should include NAC
Mobility

3 Reasons why Wireless Network Design should include NAC

In the IT world, there are a lot of terms that are defined differently based upon who you talk to. Network Access Control or NAC, is one of the terms that if I polled 20 SecurEdge clients, most of them would have a different way to define NAC. The issue is that there are so many security products out there and there is so much discussion around the term, that the lines are blurred as to what it is and what a true NAC solution should do.

Read More
What is Network Access Control (NAC)?
Security

What is Network Access Control (NAC)?

The term Network Access Control (NAC) has been around (seemingly) forever. It’s one of those terms that a lot of vendors use but everyone has defined it in a different way. Microsoft has their flavor with what they call Network Access Protection (NAP) that pushes updates and patches to windows machines. Cisco has their product called Clean Access that loads an agent on devices connecting to the network to scan the devices for potential security risks before allowing a device to connect. Then there are a bunch of other vendors out there that talk about NAC…all defining the solution in a little different way.

Read More