Network Access Control (NAC) solutions have come of age, driven by the need for dynamic network visibility and automated threat reduction, wide-scale use of mobile device for Bring-Your-Own Device (BYOD) and guest networking, and the rise of the Internet of Things (IoT). IT organizations are rapidly implementing NAC as an integral piece of their business compliance measures and overall security strategy. However, confusion continues to surround the best practices on why, where, and how to best apply a next-generation NAC solution.