• Categories

    • Loading categories...

      Loading markets...

  • For Vendors

    • Log In to Vendor Portal 

    • Get Started 

  • Write a Review

Join / Sign In
All Categories
/
Network Access Control (Transitioning to Security Service Edge)

Network Access Control (NAC) Reviews and Ratings

What is Network Access Control (NAC)?

Gartner defines network access control (NAC) as technologies that enable organizations to implement policies for controlling access to corporate infrastructure by both user-oriented devices and Internet of Things (IoT) devices. Policies may be based on authentication, endpoint configuration (posture) or users' role/identity. NAC can also implement postconnect policies based on integration with other security products. For example, NAC could enforce a policy to contain the endpoint based on an alert from a SIEM.

An organization should evaluate the following capabilities:

• Device visibility/profiling

• Access control

• Security posture check

• Guest management

• Bidirectional integration with other security products.

How Categories and Markets Are Defined
Highest Rated By Your Peers
For Willingness to Recommend
Logo of iMaster NCE-Campus
iMaster NCE-Campus
Logo of EasyNAC
EasyNAC
Logo of MetaDefender NAC
MetaDefender NAC
For 50M-1B USD Companies
Logo of EasyNAC
EasyNAC
Logo of Portnox Clear
Portnox Clear
Logo of iMaster NCE-Campus
iMaster NCE-Campus
For North America
Logo of Portnox Clear
Portnox Clear
Logo of EasyNAC
EasyNAC
Logo of Aruba ClearPass Policy Manager
Aruba ClearPass Policy Manager
Integration & Deployment
Logo of EasyNAC
EasyNAC
Logo of iMaster NCE-Campus
iMaster NCE-Campus
Logo of Extreme Management Center
Extreme Management Center

Product Listings

Filter by

Products 1 - 20 of 33
Sort by
Logo of Cisco Identity Services Engine

Cisco Identity Services Engine

By Cisco Systems

4.4
(472 Ratings)

Cisco is a company that specializes in networking technologies, particularly Internet Protocol (IP)-based solutions. It was established in 1984 by a group of computer scientists from Stanford University. As of today, Cisco has a global workforce, continuing to innovate in various fields, notably in routing and switching. Adding to its core business, the company also delves into emerging technologies including home networking, IP telephony, optical networking, security features, storage area networking, and wireless technology. Moreover, Cisco extends its expertise to offer a sweeping range of services such as technical support and advanced services. The company sells its products and services on an enterprise level, to commercial businesses, service providers, and end-users.

Show More Details
Logo of Aruba ClearPass Policy Manager

Aruba ClearPass Policy Manager

By Hewlett Packard Enterprise (HPE)

4.5
(290 Ratings)

Hewlett Packard Enterprise, known as a global edge-to-cloud company, concentrates on a range of technology and innovation services to connect, protect, analyze, and act on all data and applications wherever they live, from edge to cloud, focusing on addressing business challenges through technology.

Show More Details
Logo of Forescout 4D Platform

Forescout 4D Platform

By Forescout

4.3
(271 Ratings)

At Forescout, we envision a world where every cyber asset is seen, secure and compliant. We are a global provider of cybersecurity solutions that continuously identify, protect and help ensure the compliance of all managed and unmanaged cyber assets – IT, IoT, IoMT and OT. For more than 20 years, Fortune 100 organizations and government agencies have trusted Forescout to provide vendor-agnostic, automated cybersecurity at scale. The Forescout Platform delivers comprehensive capabilities for network security, risk and exposure management, and threat detection and response. With seamless context sharing and workflow orchestration via ecosystem partners, we enable customers to manage cyber risk and mitigate threats more effectively.

Show More Details
Logo of FortiNAC

FortiNAC

By Fortinet

4.6
(159 Ratings)

Founded more than 20 years ago in Sunnyvale, California, Fortinet continues to be a driving force in the evolution of cybersecurity and the convergence of networking and security. Securing people, devices, and data everywhere is our mission. To that end, our portfolio of over 50 enterprise-grade products is the largest integrated offering available, delivering proven cybersecurity everywhere you need it. More than 680,000 customers trust Fortinet solutions, which are among the most deployed, most patented, and most validated in the industry.

Show More Details
Logo of Ivanti NAC

Ivanti NAC

By Ivanti

4.4
(140 Ratings)

Ivanti manages and secures Everywhere Work environments so that organizations and employees can improve their digital employee experience (DEX). Ivanti technology focuses on empowering IT and employees. Ivanti solutions let IT and employees use a wide range of corporate and personal devices to access IT applications and data over multiple networks to stay productive. Ivanti solutions find, manage and protect each IT asset and endpoint in an organization, no matter the OS. Over 40,000 customers, including 88 of the Fortune 100, have chosen Ivanti to help them deliver an excellent digital employee experience and improve IT and security team productivity and efficiency.

Show More Details
Logo of iMaster NCE-Campus

iMaster NCE-Campus

By Huawei

4.8
(105 Ratings)

Huawei is a global provider of information and communications technology (ICT) solutions. The company's main focus is to enrich human progress through innovative technologies. Huawei aims to ensure that connectivity is a basic need, emphasizing the importance of access to ICT and the benefits it can provide to a wide audience. The firm specializes in creating customer-focused innovations and establishing strong partnerships, developing capabilities across carrier networks, enterprise, consumers, and cloud computing sections. With operations in over 170 countries, Huawei has a significant global presence. The company's objective is to digitally connect every person, home, and organization in order to achieve a comprehensive connected, intelligent world. Through this, Huawei works to narrow the digital gap, facilitating access to broadband services.

Show More Details
Logo of MetaDefender NAC

MetaDefender NAC

By OPSWAT

4.5
(69 Ratings)

OPSWAT is a cybersecurity company that provides solutions aimed at preventing malware and zero-day attacks for critical infrastructure. Adhering to a belief that every file and device potentially poses a threat, the company has developed products that create secure data transfer processes and ensure safe device access. This focus extends to all threat points - entry, exit, and at rest. The ultimate output of these prevention strategies is a system that is both productive and has minimal risk of being compromised.

Show More Details
Logo of Extreme Management Center

Extreme Management Center

By Extreme Networks

4.4
(57 Ratings)

Extreme Networks, Inc. (EXTR) centers on cloud networking, aiming to facilitate progressive connections between devices, applications, and individuals. The company ventures into advanced technological applications, including aspects of machine learning, artificial intelligence, analytics, and automation to implement solutions. Across the globe, a large number of clients depend on Extreme Networks' comprehensive, cloud-influenced networking solutions. The company's services and supports are heavily relied upon to speed up digital transformation operations, thus paving the way for progress.

Show More Details
Logo of EasyNAC

EasyNAC

By InfoExpress

4.8
(34 Ratings)

InfoExpress, headquartered in Santa Clara, California, delivers innovative network security solutions with its flagship product, EasyNAC. A third-generation Network Access Control (NAC) solution, EasyNAC is agentless, network-agnostic, and requires no VLAN changes, switch reconfiguration, or infrastructure refreshes—making it fast and simple to deploy. It provides real-time device visibility, Zero Trust access control, and automated threat response, while protecting against rogue devices, malware lateral spread, and MAC spoofing. EasyNAC integrates seamlessly with AV, XDR, patch management, and identity systems, and features deception-based hacking detection with near-zero false positives, ensuring organizations can achieve Zero Trust quickly and cost-effectively.

Show More Details
Logo of macmon NAC

macmon NAC

By macmon secure

4.2
(32 Ratings)

Since 2003, an experienced team of IT experts have spearheaded the vendor-independent solutions designed to safeguard heterogeneous networks from unauthorized access by providing immediate network transparency. The notable offering from this team is macmon NAC, a tool that is marked by its easy and quick implementation and its significant contribution to network security. Consequently, macmon NAC has become an integral tool in IT security, digitalization, and mobile office sectors. Additionally, macmon secure employs a zero-trust network access strategy, adding a tested layer of protection to all business resources in the cloud environment. This makes macmon secure the sole provider of NAC plus SDP with Identity and Access Management, originating from and hosted in Germany.

Show More Details
Logo of NETSHIELD

NETSHIELD

By Netshield

4.2
(27 Ratings)
Show More Details
Logo of Portnox Clear

Portnox Clear

By Portnox

4.9
(24 Ratings)

Portnox is a cloud-native zero trust access control platform specializing in network access control (NAC). Portnox allows customers to implement critical security strategies like least-privileged access, mircosegmentation, and risk policy management without taking on the burdens of managing a complex deployment.

Show More Details
Logo of RUCKUS Cloudpath Enrollment System

RUCKUS Cloudpath Enrollment System

By CommScope

4.2
(17 Ratings)

CommScope is a technology firm that focuses on the development of both wired and wireless networks. With a global workforce consisting of employees, innovators, and technologists, the company aims to empower its customers by helping them anticipate future technological trends and possibilities. The company's main objective is to progress the technological field by continually pushing its limits.

Show More Details
Logo of NACVIEW

NACVIEW

By NACVIEW

4.9
(14 Ratings)

We are a Polish software development company that started operating under the name SCAN IT in 2012. Soon after, we started the NACVIEW project which became our main product. From the beginning we have had one goal: to increase the security of companies and institutions by providing them with the ability to control access to the network.

Work on the NACVIEW system has its origins at the Poznań University of Technology. The product was created out of the real needs of this university, which could not find a product on the market that would meet its expectations. Thus we filled the market gap by creating a network administration tool that has never existed before: innovative, automated and extremely easy to use.

Show More Details
Logo of Portnox Core

Portnox Core

By Portnox

4.8
(13 Ratings)

Portnox is a cloud-native zero trust access control platform specializing in network access control (NAC). Portnox allows customers to implement critical security strategies like least-privileged access, mircosegmentation, and risk policy management without taking on the burdens of managing a complex deployment.

Show More Details
Logo of Auconet Business Infrastructure Control Solution (BICS)

Auconet Business Infrastructure Control Solution (BICS)

By Auconet

4.5
(10 Ratings)

Auconet is a trusted provider of real-time Business Infrastructure Control, security, and management solutions, catering mainly to Global 1000 companies. Its innovative platform offers features such as endpoint discovery and profiling, security management, and all-inclusive data on every device and endpoint across expansive enterprise networks. Auconet's origin can be traced back to its CEO Frank Winter and a team of proficient technology professionals who aimed to invent a holistic solution that offers real-time visibility and security of multi-vendor networks and controls over diverse infrastructures. The product of their effort, Auconet BICS, is a simplified multi-tenant platform capable of functioning in a cloud or on-premise environment, designed specifically for enterprise-grade IT Operations Management (ITOM).

Show More Details
Logo of CGX

CGX

By InfoExpress

4.2
(10 Ratings)

InfoExpress, headquartered in Santa Clara, California, delivers innovative network security solutions with its flagship product, EasyNAC. A third-generation Network Access Control (NAC) solution, EasyNAC is agentless, network-agnostic, and requires no VLAN changes, switch reconfiguration, or infrastructure refreshes—making it fast and simple to deploy. It provides real-time device visibility, Zero Trust access control, and automated threat response, while protecting against rogue devices, malware lateral spread, and MAC spoofing. EasyNAC integrates seamlessly with AV, XDR, patch management, and identity systems, and features deception-based hacking detection with near-zero false positives, ensuring organizations can achieve Zero Trust quickly and cost-effectively.

Show More Details
Logo of S3M Hybrid NAC

S3M Hybrid NAC

By S3M Security

4.9
(10 Ratings)

S3M Security is a cybersecurity organization concentrating on software creation, complemented by network and data security services. It owes its origins to industry experts with over two decades of experience. Its operations span across the USA, Europe, and EMEA regions. The team behind S3M Security diligently works towards innovating methodologies and solutions to bolster the security of various organizations amidst escalating cyber threats and attacks.

Show More Details
Logo of NAC Appliance (Legacy)

NAC Appliance (Legacy)

By Extreme Networks

4.7
(9 Ratings)

Extreme Networks, Inc. (EXTR) centers on cloud networking, aiming to facilitate progressive connections between devices, applications, and individuals. The company ventures into advanced technological applications, including aspects of machine learning, artificial intelligence, analytics, and automation to implement solutions. Across the globe, a large number of clients depend on Extreme Networks' comprehensive, cloud-influenced networking solutions. The company's services and supports are heavily relied upon to speed up digital transformation operations, thus paving the way for progress.

Show More Details
Logo of ExtremeControl

ExtremeControl

By Extreme Networks

4
(7 Ratings)

Extreme Networks, Inc. (EXTR) centers on cloud networking, aiming to facilitate progressive connections between devices, applications, and individuals. The company ventures into advanced technological applications, including aspects of machine learning, artificial intelligence, analytics, and automation to implement solutions. Across the globe, a large number of clients depend on Extreme Networks' comprehensive, cloud-influenced networking solutions. The company's services and supports are heavily relied upon to speed up digital transformation operations, thus paving the way for progress.

Show More Details

Gartner Research

Market Guide for Network Access Control (Transitioning to Security Service Edge)
Gartner Peer Insights 'Voice of the Customer': Network Access Control (Transitioning to Security Service Edge)

Top Trending Products

Portnox Clear

Popular Product Comparisons

Aruba ClearPass Policy Manager vs FortiNAC

Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

This site is protected by hCaptcha and its Privacy Policy and Terms of Use apply.


Software reviews and ratings for EMMS, BI, CRM, MDM, analytics, security and other platforms - Peer Insights by Gartner
Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQsPrivacyTerms of Use

©2025 Gartner, Inc. and/or its affiliates.

All rights reserved.