Newest Listing

Top Rated

Most Popular

Network Access ControlRSS

Wireless access points, conference room ethernet ports, travelling laptops.  These are all entries into your network *behind* your firewalls.  And they bring risk.  Malicious activity, unknown programs, viruses, all can be released into the corporate network by simply connecting to it.  Or, corporate confidential information can be taken out of the network by connecting a malicious computer and downloading from the network file servers.

 

Network Access Control (NAC) products (also referred to as Network Admission Control, Network Access Protection (NAP), or Network Quarantine) protect networks by authenticating and authorizing users and computers prior to granting access to the network.  The implementation by each product varies widely, using solutions such as DHCP servers, VPNs, or switch hardware.  Some solutions require endpoint software be installed on each client.

Visit the Product Site

CyberGatekeeper LAN and CyberGatekeeper Remote let systems access the network only after verifying they comply with security policies. If systems are not in compliance or do not participate in the audit, they are kept in a quarantine network. With network ...

VendorInfoExpress
Pricing ModelCommercial
Modified

Visit the Product Site

Check Point Endpoint Security™ is the first and only single agent that combines all essential components for total security on the endpoint: highest-rated firewall, antivirus, anti-spyware, full disk encryption, media encryption with port protection, netw ...

VendorCheck Point Software Technologies Ltd
Pricing ModelCommercial
Modified

Visit the Product Site

SonicWALL has added the award-winning Aventail SSL VPN product line to our E-Class SRA appliances. Aventail's best-of-breed SSL VPNs deliver secure remote access to the most resources from the most end point locations. Aventail was named in the Visionari ...

VendorSonicWALL
Pricing ModelCommercial
Modified
Cisco NAC Appliance

Visit the Product Site

With Cisco NAC Appliance (formerly Cisco Clean Access), use your organisation's network infrastructure to enforce security policy compliance on all devices that attempt to gain access. Your network administrators can use the Cisco NAC Appliance to authent ...

VendorCisco Systems Inc.
Pricing ModelCommercial
Modified

Visit the Product Site

Mirage enables you to control who gains admission to the network, ensuring that uninvited, infected, and out-of-policy endpoints are never allowed to access and harm the network. Our agentless Network Access Control technology performs risk assessment on ...

VendorMirage Networks
Pricing ModelCommercial
Modified

Visit the Product Site

Total control over those dangerous endpoints Safe Access®—the world's best, most secure network access control (NAC) solution—ensures that compromised, dangerous endpoints don't get on your network and cause havoc. Take the pain out of compliance Yea ...

VendorStillSecure
Pricing ModelCommercial
Modified

Visit the Product Site

Sophos Network Access Control (NAC) Advanced safeguards data. NAC Advanced protects information by permitting access to the users who need it and enables companies to create comprehensive security policies to check that any computer accessing the network ...

VendorSophos Ltd.
Pricing ModelCommercial
Modified

Visit the Product Site

LANDesk Security Suite lets you automatically detect and deploy security patches with active endpoint security management from a single console. Take active control of endpoint security with support for advanced security management with quarantine, antivi ...

VendorLANDesk Software
Pricing ModelCommercial
Modified

Visit the Product Site

NAP is one of the most desired and highly anticipated features of Microsoft® Windows® Server 2008. NAP is a new platform and solution that controls access to network resources based on a client computer’s identity and compliance with corporate governance ...

VendorMicrosoft Corp.
Pricing ModelCommercial
Modified

Visit the Product Site

Nortel Secure Network Access for the enterprise LAN extends endpoint security-- threat mitigation and policy compliance -- to secure the enterprise LAN infrastructure. Because so many threats are from internal users on the network, endpoint security must ...

VendorNortel Networks
Pricing ModelCommercial
Modified
Symantec Network Access Control

Visit the Product Site

Symantec Network Access Control 11.0 securely controls access to corporate networks, enforces endpoint security policy and easily integrates with existing network infrastructures. Regardless of how endpoints connect to the network, Symantec's award-winnin ...

VendorSymantec Corporation
Pricing ModelCommercial
Modified

Visit the Product Site

Guests, contractors, vendors, technicians, devices, students, patients – they all need different levels of network access, but existing tools for segmenting the LAN are cumbersome, leave security holes, and can’t scale to meet the increased ...

VendorConSentry Networks
Pricing ModelCommercial
Modified

Visit the Product Site

IT needs to be able to ensure that devices attempting network access are in compliance with corporate security policies, every time, and before they are allowed onto the network. Endpoints that fail to meet policy compliance should be automatically quaran ...

VendorNevis Networks
Pricing ModelCommercial
Modified
CounterACT

Visit the Product Site

ForeScout CounterACT works with your existing network infrastructure and automatically enforces whatever network access policies you desire for your organisation. Being agentless, and contained in a single appliance, ForeScout CounterACT is easy to instal ...

VendorForescout Technologies
Pricing ModelCommercial
Modified

Visit the Product Site

BigFix is the only policy-driven, unified IT security and operations optimization platform that enables IT.Next levels of real-time visibility and control of all enterprise computing devices. BigFix accomplishes this through a revolutionary massively scal ...

VendorBigFix Inc.
Pricing ModelCommercial
Modified
Network VirusWall Enforcer

Visit the Product Site

Control access to your network with Trend Micro Network VirusWall Enforcer. This plug-n-protect, agentless network access control (NAC) appliance controls network access by ensuring devices—managed or unmanaged, local or remote—comply with corporate secur ...

VendorTrend Micro Inc.
Pricing ModelCommercial
Modified

Visit the Product Site

PacketFence is an open-source package that provides network access control (NAC). Deployed in academic networks around the world, PacketFence is reliable, extremely configurable, and built upon unmodified open-source code (Fedora, LAMP, Perl, and Snort). ...

VendorPacketFence
Pricing ModelFreeware, Licensed under GPL
Modified

Visit the Product Site

Insightix NAC ? Stateful Network Access Control. Insightix NAC delivers stateful network access control, ensuring that only authorized and compliant devices are allowed to access and operate on the enterprise network. Insightix NAC utilizes agentless Sta ...

VendorInsightix
Pricing ModelFreeware, Licensed under GPL
Modified

Visit the Product Site

Enterasys® Network Access Control is a complete standards-based, multi-vendor interoperable pre-connect and post-connect Network Access Control solution. Using Enterasys NAC Controller and/or NAC Gateway appliances with NetSight® NAC Manager configuration ...

VendorEnterasys Networks
Pricing ModelCommercial
ModifiedNever

Visit the Product Site

entegra provides powerful and effective endpoint security and network access control functionality that protect endpoints inside and outside the perimeter. The entegra endpoint security framework offers centralised policy management and distribution, ...

VendorPhion AG
Pricing ModelCommercial
Modified