Software like this invariably uses a technique called TCP stack fingerprinting to determine whether your device is of the sort that requires the software installed. Basically, invalid or strange TCP packets are sent to you upon first appearance (or at DHCP time or something), and the response to each helps the security system to decide whether you're a Windows box, a Linux box, a handheld something, or a game console, because the stack on each of these systems responds a little differently to out-of-RFC TCP junk.
There are several pieces of software out there, most notably OSfuscate (http://www.irongeek.com/i.php?page=security/osfuscate-change-your-windows-os-tcp-ip-fingerprint-to-confuse-p0f-networkminer-ettercap-nmap-and-other-os-detection-tools) and sec_cloak (http://www.hacker-soft.net/Soft/Soft_2304.htm, but the link is quite broken), that reconfigure your Windows TCP stack via the registry to appear to these tools like something entirely different. After doing that, just tell your IT department that you need to get your other device on their network and most places will whitelist you. The most popular choice for what to emulate is a Sega Dreamcast; why that is the case is left as an excercise to the reader...
At most places, looking like something that can't run their spyware gets you online, but some places want to see the hardware (especially for game consoles), so if you're concerned, say the machine runs Linux sometimes and show it to them running Linux (off a LiveCD if you must) if they ask. Then use software to make your Windows look like Linux too, and the exception they'll have put in for "a Linux box with MAC xx:xx:xx:xx:xx" will cover both systems.
"What inspired this particular project? WB: I think it's a combination of things. (*bang*) One, it is understanding the culture and how people interact with each other in this digital age. But, the trigger of this project was that I was watching (*bang*) the news — in fact, ABC news, when they had an interview with an American soldier sitting in a base in Colorado, and she was firing missiles into Iraq (*bang*) after being given information by American soldiers on the ground (*bang*) in Iraq, and when asked if she had any regard of human life, she said "No, these people are bad, and I'm getting very good intelligence from people on the ground."
Thus spake the master programmer: "Time for you to leave." -- Geoffrey James, "The Tao of Programming"