Scans devices for their security status before granting network access
Safeguards against both known and unknown devices
It can be provided as a software or hardware solution
IEEE 802.1x Protocol

Time-based, Location-based, Role-based NAC can also be implemented

Devices attempting to connect to the network are placed in a virtual holding area
It the devices passes the verification it can access the organizations network resources
It the devices fails the verification it is placed into a quarantined zones

Persistent Agent

A software installed on a device requesting network access
Does not work in BYOD scenarios

Non-Persistent Agent

User connects to Wi-Fi, accesses a web portal and clicks on link for login