Network Access ControlRSS

Wireless access points, conference room ethernet ports, travelling laptops.  These are all entries into your network *behind* your firewalls.  And they bring risk.  Malicious activity, unknown programs, viruses, all can be released into the corporate network by simply connecting to it.  Or, corporate confidential information can be taken out of the network by connecting a malicious computer and downloading from the network file servers.

 

Network Access Control (NAC) products (also referred to as Network Admission Control, Network Access Protection (NAP), or Network Quarantine) protect networks by authenticating and authorizing users and computers prior to granting access to the network.  The implementation by each product varies widely, using solutions such as DHCP servers, VPNs, or switch hardware.  Some solutions require endpoint software be installed on each client.

Unified Access Control (UAC) is a standards-based, scalable solution for adaptive access control that reduces threat exposure and mitigates risks. It protects your network, guarding mission-critical applications and sensitive data, and providing comprehen ...

VendorJuniper Networks, Inc
Pricing ModelCommercial
ModifiedNever
McAfee Network Access Control

Protect your network from noncompliant or infected systems Noncompliant, infected, or misconfigured systems pose security risks and incur costs due to system downtime and restoration. Even one infected host on the network can cause disruptions to network ...

VendorMcAfee
Pricing ModelCommercial
Modified
ArubaOS Policy Enforcement Firewall Component

Aruba's Policy Enforcement Firewall (PEF) module for ArubaOS delivers ICSA-certified stateful firewall network security and enables role-based access control for wired, wireless and VPN users. PEF enforces wired and wireless network access policies tha ...

VendorAruba Networks, Inc.
Pricing ModelCommercial
Modified

To keep your business secure and productive, you don't just need to ensure that your endpoints won't harm your network—you also need to prove it. With Novell ZENworks Network Access Control, you get the full range of policy compliance tests, real-time sta ...

VendorNovell
Pricing ModelCommercial
ModifiedNever

Dynamic NAC is the Network Access Control solution that requires ZERO network changes, making it many times easier and faster to deploy than traditional NAC solutions. Dynamic NAC offers centralized management, flexible policies, granular quarantining and ...

VendorInfoExpress
Pricing ModelCommercial
Modified

DBAPPSecurity Web monitor provides security solutions of real-time monitoring, security alarm and ex post facto for web application which support direct and bypassing connecting deployment and achieve zero-risk deployment to application layer

VendorDBAPPSecurity
Pricing ModelCommercial
Modified

  Zenprise MobileManager lets you manage the device lifecycle across every major platform—iPhone, iPad, Android, BlackBerry, Symbian, and Windows Mobile.     Deploy Deployment choices: on-premise, cloud, or hybrid Protect data with ...

VendorZenPrise
Pricing ModelCommercial
Modified
Cisco identity Services Engine

Whether you need to support employee "bring-your-own-device" (BYOD) to work practices, or provide more secure access to your data center resources, the Cisco Identity Services Engine (ISE) meets your needs. It helps you reliably enforce compliance, enhanc ...

VendorCisco
Pricing ModelCommercial
Modified
Zscaler Guest Wifi Protection

Securing Guest Wifi networks presents unique challenges - unknown/unauthenticated users, varied devices and operating systems, the need for a smooth user experience - all coupled with minimal resources and in-house manpower to manage the solution.

VendorZscaler
Pricing ModelCommercial
Modified

Dynamic NAC is the Network Access Control solution that requires ZERO network changes, making it many times easier and faster to deploy than traditional NAC solutions. Dynamic NAC offers centralized management, flexible policies, granular quarantining and ...

VendorInfoexpress
Pricing ModelCommercial
Modified

© Computer Network Defence Limited 2020