End Point Security & NAC?

We have had some discussions about End Point Security (determinig who a user is and if they are authorized to access the network - 802.1x) and Network Access Control - allowing users to different parts of the network (vlans) or not.

Is anyone doing this in their Enterprise?  How are you doing it?  What are you doing it with?  Would you do it again?  What would you do differently?  It it just a tremendously huge PITA - is it worth it?

Points split equally to on topic replies.

Thanks guys & gals.  :)
LVL 27
pseudocyberAsked:
Who is Participating?
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

All Courses

From novice to tech pro — start learning today.