Global Network Access Control Market, Forecast to 2024
|出版商||Frost & Sullivan||商品編碼||670611|
|出版日期||內容資訊||英文 160 Pages
|網路存取控制市場:至2024年的預測 Global Network Access Control Market, Forecast to 2024|
|出版日期: 2020年03月25日||內容資訊: 英文 160 Pages||
網路存取控制 (NAC)的核心，實現行動和動態安全。可是，企業網路四周並沒有安全牆守護，延伸到員工和資料移動的地方正在改變我們的生活和工作方式。因此，導致網路擴大，資源的管理複雜化，需要多樣的安全解決方案。NAC，提高網路設備的能見度和監視功能，更多的安全功能，與下一代防火牆等其他安全產品的協作，安全資訊與活動管理，Web內容過濾器等不斷發展。現今的NAC安全解決方案，必須提供分析，政策執行，來賓訪問，BYOD onboarding等，實現負擔的減輕，威脅的保護強化，用戶體驗的提高。市場成長的原動力，是IoT，BYOD，行動的提高，工作負載的雲端轉移等的成長。端點設備數與多樣性，多樣的操作系統指數函數性增加。惡意程式和電腦網路攻擊的增加，也推動NAC的投資。
Innovation Continues to Be Driven by Cloud, BYOD, and the Internet of Things
This Frost & Sullivan report analyzes the global market for network access control (NAC). The “traditional” focus of NAC has been authentication, authorization, and accounting. At its core, NAC is all about enabling mobility and dynamic security. However, the enterprise network no longer sits within four secure walls: it extends to wherever employees and data travel. Mobility, digitization, and the Internet of Things (IoT) are changing the way we live and work. The result is that networks are expanding and resulting in increasing complexity of managing resources and disparate security solutions. NAC is evolving to have improved visibility and monitoring of network devices, more security features, orchestration with other security products such as next-generation firewalls, security information and event management, and web content filters. Today's NAC security solutions must deliver profiling, policy enforcement, guest access, bring-your-own-device (BYOD) onboarding, and more to offer IT offload, enhanced threat protection, and an improved user experience. Growth is driven by growth of the IoT, BYOD, increasing mobility, and organizations migrating workloads to the cloud. There is exponential growth in the number and diversity of endpoint devices and diverse operating systems. The increasing level of malware and cyberattacks is also driving NAC investments.
Network visibility is critical: every device on a network is a potential attack or reconnaissance point that must be discovered and secured. A major trend is the convergence of information and operational technology (IT/OT), wherein NAC is helping to break down silos. Zero Trust Architecture is a security model that is gaining attention, NAC is a foundational technology providing visibility and control, segmentation, orchestration, and integration with other security technologies. NAC is evolving from a physical appliance deployed on premises. Virtual appliances, software deployment, and NAC as software as a service are growing. NAC must have visibility across the enterprise: campus, data center, private cloud, public cloud, and OT networks. In addition to the IEEE 802.1X standard, most NAC vendors are supporting other protocols, such as Simple Network Management Protocol (SNMP). Several mergers and acquisitions and spinouts have occurred in the last couple of years. Companies have been consolidating and realigning product lines in order to leverage their intellectual property and expertise across a broad range of security solutions. A concept that is gaining momentum is Zero Trust Network (ZTN). Based on the basic principle of “never trust, always verify,” ZTN is a general approach for leveraging various security technologies to enable perimeter enforcement and strict access controls. NAC is a foundational technology for ZTN. NAC orchestrates and integrates a variety of network and security infrastructure to achieve a ZTN.