Skip to main content

Network Access Control

Network Access Control

Wireless access points, conference room ethernet ports, travelling laptops.  These are all entries into your network *behind* your firewalls.  And they bring risk.  Malicious activity, unknown programs, viruses, all can be released into the corporate network by simply connecting to it.  Or, corporate confidential information can be taken out of the network by connecting a malicious computer and downloading from the network file servers.

 

Network Access Control (NAC) products (also referred to as Network Admission Control, Network Access Protection (NAP), or Network Quarantine) protect networks by authenticating and authorizing users and computers prior to granting access to the network.  The implementation by each product varies widely, using solutions such as DHCP servers, VPNs, or switch hardware.  Some solutions require endpoint software be installed on each client.

InfoExpress, Inc.

CyberGatekeeper LAN and CyberGatekeeper Remote let systems access the network only after verifying they comply with security policies. If systems are not in compliance or do not participate in the audit, they are kept in a quarantine network. With network ...

CyberGatekeeper
Check Point Software Technologies Ltd

Check Point endpoint security includes data security, network security, advanced threat prevention, forensics, endpoint detection and response (EDR), and remote access VPN solutions. To offer simple and flexible security administration, Check Point’s enti ...

Check Point Endpoint Security

CGX

InfoExpress, Inc.

The CGX server is a VM or appliance that provides a full suite of network access control applications to create a flexible and custom NAC solution. Optionally install agents to provide granular policy compliance and to deploy Dynamic NAC to control access ...

CGX
SonicWall, Inc.

Secure your infrastructure while empowering your workforce. The Secure Mobile Access (SMA) series offers complete security for remote access to corporate resources hosted on-prem, in cloud and in hybrid datacenters. SonicWall Secure Mobile Access (SMA) i ...

Secure Mobile Access
Infoexpress, Inc.

Know and control your network with Easy NAC, the simple and affordable Network Access Control solution. Easy NAC automatically discovers devices, profiles them, and controls access to the network. Easy NAC’s unique technology requires no network changes ...

Easy NAC

Securing Guest Wifi networks presents unique challenges - unknown/unauthenticated users, varied devices and operating systems, the need for a smooth user experience - all coupled with minimal resources and in-house manpower to manage the solution.

Zscaler Guest Wifi Protection

In zero-trust architecture, ISE is the policy decision point. It gathers intel from the stack to authenticate users and endpoints, automatically containing threats. ?Harness the power of resilience? ?Resilience begins with secure connections. ISE helps ...

Cisco Identity Services Engine

You manage hundreds or thousands of devices and applications, numerous assets, and an unending list of software patches. And on top of it all, your workforce is constantly changing with new requests every day. The ZENworks Suite can help. ZENworks Servic ...

ZENWorks Suite
Aruba Networks, Inc.

Control what connects to the network, authorize access, and implement granular security control with consistent network policies for enterprise grade visibility. Automated policy control and responseAruba ClearPass Policy Manager helps IT teams deploy ro ...

Aruba Network Access Control
Enterasys Networks

Control users and devices across your networks with granular visibility and in-depth control. ExtremeControl extends the functionality within ExtremeCloud IQ – Site Engine. From a single screen, it enables the enforcement of consistent, highly secure acc ...

ExtremeControl

PacketFence is an open-source package that provides network access control (NAC). Deployed in academic networks around the world, PacketFence is reliable, extremely configurable, and built upon unmodified open-source code (Fedora, LAMP, Perl, and Snort). ...

Trend Micro Inc.

As part of Trend Micro Vision One, Trend Micro Zero Trust Secure Access follows the principles of Zero Trust networking. This strengthens your overall security posture by enforcing strong access control permissions from multiple identity services across t ...

Zero Trust Secure Access
Forescout Technologies

The most comprehensive visibilityGet 100% visibility of all devices connected to your extended networks, in real time, due to our 20+ active and passive techniques. Zero Trust for all connecting devicesContain breach impact through continuous agentless m ...

Modern NAC
Nevis Networks

The LANenforcer 2024 and 2124 LAN Security Appliances transparently integrate into existing network infrastructures, sitting between existing switches at the access and distribution layers. The LANenforcer Appliance is an ideal solution for organizations ...

Microsoft Corp.

NAP is one of the most desired and highly anticipated features of Microsoft® Windows® Server 2008. NAP is a new platform and solution that controls access to network resources based on a client computer’s identity and compliance with corporate governance ...

Network VisibilityAutomatically detect, classify, profile and monitor rogue network devices and their security state. Endpoint ComplianceEndpoint security posture assessment; pre and post connection – 802.1x or non-802.1x. Guest ManagementAutomated, spo ...

Policy Secure NAC

Intercept X Endpoint Features Endpoint Detection and Response (EDR)Automatically detect and prioritize potential threats and quickly see where to focus attention and know which machines may be impacted Extended Detection and Response (XDR)Go beyond the ...

Intercept X Endpoint