While external malicious threats continue to terrorize the enterprise network, network access control (NAC) solutions are also challenged by IT transformations like “bring your own device” (BYOD), cloud services, and the Internet of Things (IoT). As the last line of defense in network security, enterprises must adapt NAC for a borderless network that services an increasing number and type of endpoints.