Back to Blog

What is Network Access Control (NAC)?

What is Network Access Control (NAC)?

In a world where employees bring their own devices to work, contractors need temporary network access, and IoT devices multiply across offices, controlling who and what connects to your business network has never been more important. Network Access Control — commonly abbreviated to NAC — is the technology and set of policies that governs exactly this: determining who is allowed to access your network, what level of access they receive, and what conditions must be met before that access is granted.

For UK businesses of all sizes, NAC has shifted from being an enterprise-only technology to a practical necessity. The proliferation of devices, the rise of hybrid working, increasing regulatory requirements under UK GDPR, and the ever-growing sophistication of cyber threats all demand that businesses take a more deliberate approach to network access. Simply having a Wi-Fi password is no longer sufficient security in any meaningful sense.

This guide explains what NAC is, how it works, why it matters for UK businesses, and how to implement it effectively without breaking the bank.

73%
of UK data breaches involve unauthorised network access
3.4
average number of devices per employee connecting to business networks
£3.4M
average cost of a data breach in the UK (IBM Security Report)
58%
of UK businesses have no formal network access policies

NAC Explained in Simple Terms

Think of Network Access Control as a bouncer for your business network. When someone — or something — tries to connect, NAC checks their identity, verifies their credentials, inspects the health of their device, and then decides whether to let them in, what areas they can access, and what restrictions apply.

Without NAC, your network is essentially an open door. Anyone who knows the Wi-Fi password or can plug into an Ethernet port has full access to everything on the network — file shares, printers, servers, and potentially sensitive business data. With NAC, every connection is authenticated, authorised, and monitored, ensuring that only approved users with compliant devices can access the resources they need.

The Three Core Questions NAC Answers

Every NAC system fundamentally answers three questions about each device attempting to connect to the network. First: Who are you? This is authentication — verifying the identity of the user or device through credentials such as usernames, passwords, certificates, or multi-factor authentication. Second: Are you allowed? This is authorisation — checking whether the authenticated user has permission to access the network and determining their level of access based on their role. Third: Are you safe? This is posture assessment — inspecting the connecting device to ensure it meets minimum security standards such as having up-to-date antivirus, current operating system patches, and an active firewall.

How NAC Works: The Technical Process

Understanding the technical process behind NAC helps demystify the technology and makes it easier to evaluate solutions for your business. The process follows a logical sequence every time a device attempts to connect to your network.

Step 1: Detection

When a device connects to the network — whether via Ethernet, Wi-Fi, or VPN — the NAC system detects the connection attempt. This detection can happen through integration with network switches, wireless access points, or VPN gateways. The device is initially placed in a restricted state where it cannot access any network resources.

Step 2: Authentication

The NAC system prompts the user or device to authenticate. This typically uses the 802.1X standard, which works with a RADIUS server to verify credentials against a directory service such as Microsoft Active Directory or Azure Active Directory. The user might enter their standard business credentials, or the device might present a digital certificate that was pre-installed by the IT team.

Step 3: Posture Assessment

Once the user is authenticated, the NAC system inspects the device itself. Is the operating system up to date? Is antivirus software installed and running? Is the firewall enabled? Is the device encrypted? Does it meet the minimum security standards defined in your NAC policy? This assessment can be performed using a lightweight agent installed on the device or agentlessly through network-based scanning.

Step 4: Authorisation and Segmentation

Based on the authentication result and posture assessment, the NAC system assigns the device to an appropriate network segment with defined access permissions. A company-owned laptop belonging to a finance team member might receive access to the finance file share and accounting application but not to the development servers. A contractor's personal device might be placed on a restricted guest network with internet access only.

Full Access (managed, compliant device)
100%
Limited Access (compliant BYOD)
65%
Quarantine (non-compliant device)
20%
Guest Access (visitor, internet only)
10%
Blocked (failed authentication)
0%

Why UK Businesses Need NAC

The need for NAC in UK businesses has grown dramatically in recent years, driven by several converging trends that show no signs of slowing down.

The BYOD Challenge

Bring Your Own Device policies are now commonplace in UK businesses. According to a survey by Tech Research Asia, 67% of UK employees use at least one personal device for work purposes. Each of these devices represents a potential security risk — they may lack antivirus software, run outdated operating systems, or be shared with family members who visit risky websites. NAC gives you visibility and control over these devices without preventing their use entirely.

Regulatory Compliance

The UK GDPR and Data Protection Act 2018 require organisations to implement appropriate technical measures to protect personal data. The Information Commissioner's Office (ICO) has made it clear that network security is a fundamental component of these measures. NAC provides demonstrable, auditable evidence that you control access to systems containing personal data — evidence that can be invaluable if you ever face an ICO investigation.

The IoT Explosion

Modern offices are filled with Internet of Things devices — smart printers, IP cameras, environmental sensors, smart TVs in meeting rooms, and building management systems. Many of these devices have poor built-in security and cannot run traditional endpoint protection software. NAC allows you to identify, segment, and restrict these devices, preventing them from becoming entry points for attackers.

With NAC Implemented

  • Every device identified and catalogued
  • Automatic security posture checking
  • Role-based access to network resources
  • Guest devices isolated from business data
  • IoT devices segmented and controlled
  • Full audit trail of network connections
  • Automated quarantine of non-compliant devices
  • Compliance evidence for GDPR and Cyber Essentials

Without NAC

  • Unknown devices connecting freely
  • No visibility of device security status
  • All users have same level of access
  • Guests access same network as staff
  • IoT devices share network with servers
  • No record of who connected when
  • Compromised devices spread malware freely
  • Difficulty demonstrating regulatory compliance

NAC and Cyber Essentials

The UK government's Cyber Essentials scheme, administered by the NCSC, identifies five key security controls that every organisation should implement. Network Access Control directly supports several of these controls, including secure configuration, access control, and malware protection. Businesses pursuing Cyber Essentials Plus certification — which includes a hands-on technical audit — will find that having NAC in place significantly simplifies the certification process.

Types of NAC Solutions

NAC solutions vary significantly in complexity, cost, and capability. Understanding the different approaches helps you choose the right solution for your business size and requirements.

NAC Type Best For Typical Cost Complexity
Cloud-Managed NAC SMEs (10-250 users) £3-£8 per device/month Low-Medium
Integrated NAC (e.g., Cisco Meraki) SMEs with existing vendor ecosystem Included with networking hardware Low
Enterprise NAC (e.g., Cisco ISE, Aruba ClearPass) Large organisations (250+ users) £15,000-£50,000+ High
Microsoft Intune + Conditional Access Microsoft 365 environments Included in M365 Business Premium Medium

Cloud-Managed NAC

For most UK SMEs, cloud-managed NAC solutions offer the best balance of capability, simplicity, and cost. These solutions are managed through a web-based dashboard, require no on-premises servers, and can typically be deployed in days rather than weeks. Providers include Portnox, SecureW2, and Foxpass.

Integrated NAC

If you already use a unified networking platform such as Cisco Meraki, Ubiquiti, or Aruba Instant On, NAC capabilities may already be available to you at no additional cost. These integrated solutions are typically less feature-rich than dedicated NAC platforms but are perfectly adequate for many small business environments. Cisco Meraki's built-in NAC features, for example, include 802.1X authentication, RADIUS integration, and device profiling.

Microsoft Conditional Access

For businesses using Microsoft 365 Business Premium or Enterprise, Microsoft Intune combined with Conditional Access policies provides a form of NAC that is particularly effective for controlling access to cloud resources. You can require devices to be enrolled in Intune, compliant with security policies, and authenticated with multi-factor authentication before they can access Microsoft 365 applications, SharePoint, Teams, and other cloud services.

802.1X Authentication Setup
Phase 1
Device Posture Policies
Phase 2
Network Segmentation
Phase 3
Full NAC Enforcement
Phase 4

Implementing NAC: A Practical Guide

Implementing NAC does not have to be an all-or-nothing exercise. In fact, the most successful deployments follow a phased approach that minimises disruption and allows your team to adapt gradually.

Phase 1: Monitor Mode. Deploy NAC in monitor-only mode. The system observes and catalogues every device connecting to your network without blocking anything. This gives you a complete picture of your network — you may be surprised by what you find. Many businesses discover devices they did not know existed, including personal phones, smart speakers, and equipment left by previous tenants.

Phase 2: Policy Definition. Based on your monitoring data, define access policies for different user roles and device types. Determine what level of access each group needs, what security requirements devices must meet, and how to handle non-compliant devices. Document these policies clearly and communicate them to staff.

Phase 3: Gradual Enforcement. Begin enforcing policies gradually, starting with the least disruptive controls. You might start by segmenting guest devices onto a separate network, then move to enforcing posture checks on company-owned devices, and finally implement full 802.1X authentication. Each stage should be accompanied by clear communication to staff and a well-publicised process for getting help with any access issues.

Phase 4: Continuous Monitoring. NAC is not a set-and-forget technology. Regularly review your policies, monitor for anomalies, and adjust as your business evolves. New device types, new applications, and new working patterns all require policy updates.

Common NAC Challenges and How to Overcome Them

NAC implementations can encounter challenges, but being aware of them in advance allows you to plan effectively. Legacy devices that do not support 802.1X authentication can be handled with MAC authentication bypass and placed on a restricted VLAN. Staff resistance to new login procedures can be minimised with clear communication and single sign-on integration. Printers and IoT devices that cannot run agents can be profiled and segmented using their MAC addresses and traffic patterns.

The most important factor in a successful NAC deployment is executive buy-in. NAC changes how people connect to the network, and that inevitably generates some friction. If leadership understands and supports the initiative, the organisation will adapt. If NAC is implemented quietly by IT without broader organisational support, it risks being undermined or abandoned at the first complaint.

Ready to Secure Your Network with NAC?

Cloudswitched helps UK businesses implement practical, effective Network Access Control solutions. From initial assessment and policy design to deployment and ongoing management, we ensure your NAC implementation protects your business without disrupting it. Contact us for a free network security review.

Book a Free Network Security Review

Key Takeaways

Network Access Control is no longer an enterprise-only technology. UK businesses of all sizes need to control who and what connects to their networks, particularly in an era of BYOD, IoT, hybrid working, and increasingly sophisticated cyber threats. Modern NAC solutions are affordable, manageable, and effective. The key is choosing the right solution for your environment and implementing it in a phased, thoughtful manner that balances security with usability. Start with visibility, build towards enforcement, and maintain continuous monitoring. Your network — and your data — will be significantly more secure as a result.

Tags:NACNetwork SecurityAccess Control
CloudSwitched
CloudSwitched

Centrally located in London, Shoreditch, we offer a range of IT services and solutions to small/medium sized companies.