The differentiator Cisco has over other security vendors is that its architecture embeds security across the extended network -- routers, switches and the data center -- significantly reducing the time to detection and remediation.
• The NAC market is forecasted to achieve a compounded annual growth rate of 29.5% and reach
$1.46 billion by 2018.
• Gartner estimates in 2015 growth to be conservative at approximately 20%. Cisco, Juniper (now
Pulse Secure) and ForeScout—represent 70% of the NAC market.
Key Market Drivers-
• Extent of endpoint visibility and ability to fast quarantine.
• Increasing “BYOD” and resultant malware attach rate.
• Ease of use and deployment.
• Ability to detect and restrict malware before and after.
• Granular policy settings.
• Integration with other security tools and draw upon a cohesive SPOG.
• Scalability, ease of management, support & Pricing.
Top Verticals- 80% Sales
• Financial sector
Key Observations and Drivers :
• Sourcefire Advanced Malware Protection detected 99% of HTTP malware, 98% of email malware, and 100% of exploits,
giving an overall breach detection rating of 99.0%. The device passed all stability and reliability tests.
• NIST 4.0 requires agencies of the federal government to provide an inventory of devices, applications, and OS every
• HIPPA requires that data privacy must be protected.
• College students have large numbers of unmanaged device sand are tech savy.
Evolution of NAC Solutions and Market
based data & reports
inventory & exceptions
portal for proactive
Prioritize & track NCE
Basic Minimum checks for anyone
Cisco, ForeScout, Aruba, IBM,
Cisco, Juniper, IBM, ForeScout,
Trustwave, Avenda, Bradford
MS, HP, Juniper, McAfee, Symantec, Cisco
Access Control EnforcementRemediation/Captive Portal Posture Checks
• BYOD, ENT Mobility, IoE &
Warehouse of context (Cisco,
• Cohesive, distributed, closed loop
defense mechanism with end-point
and perimeter integration.
• Mobility Management, Cloud Mgmt.
• Access Control
• End point Security
• Posture Checking
• Device profiling
• Policy management
• Captive portals, CoA
Restrictive Approach Permissive Approach-”Need to Know”
• Interoperability & 3rd Party –
existing Infra, EMM, SIEM etc.
• Mobile Workforce-Deployment
• Scalability issues
• Streamline IT
device mgmt., monitoring, threat
protection & remediation)
• SPOG & SSOT
• Faster remediation and
• Compliance in a BYOD
Can I control where they go
Can I shut them off if they misbehave and
find the malware
Can I remove the malware once it has
entered the network.
Does your NAC solution work seamlessly with
my existing infrastructure.
who is connecting to my network and are
What are they saying?
There are only two types of companies: those that have been hacked and those that will be.
Security should be built in the foundation.
• Many point security
solutions and gears.
• Detached security
• Mostly Reactive measures
• Lack of credible deterrence
against persistent threats.
• Mobile Malware and IoT
Malware and Threats.
• 4,900 new android malware
samples every day.
• SMAC + IoT
• Distributed yet cohesive
• Convergence of platforms
• SPOG management view.
• Cloud nw resources and
virtual environments policy
• Threat containment and
• Seamless information
sharing across boundaries.
• Partnerships and market