Wireless access points, conference room ethernet ports, travelling laptops. These are all entries into your network *behind* your firewalls. And they bring risk. Malicious activity, unknown programs, viruses, all can be released into the corporate network by simply connecting to it. Or, corporate confidential information can be taken out of the network by connecting a malicious computer and downloading from the network file servers.
Network Access Control (NAC) products (also referred to as Network Admission Control, Network Access Protection (NAP), or Network Quarantine) protect networks by authenticating and authorizing users and computers prior to granting access to the network. The implementation by each product varies widely, using solutions such as DHCP servers, VPNs, or switch hardware. Some solutions require endpoint software be installed on each client.
CyberGatekeeper LAN and CyberGatekeeper Remote let systems access the network only after verifying they comply with security policies. If systems are not in compliance or do not participate in the audit, they are kept in a quarantine network. With network ...
Check Point endpoint security includes data security, network security, advanced threat prevention, forensics, endpoint detection and response (EDR), and remote access VPN solutions. To offer simple and flexible security administration, Check Point’s enti ...
SonicWALL has added the award-winning Aventail SSL VPN product line to our E-Class SRA appliances. Aventail's best-of-breed SSL VPNs deliver secure remote access to the most resources from the most end point locations. Aventail was named in the Visionari ...
With Cisco NAC Appliance (formerly Cisco Clean Access), use your organisation's network infrastructure to enforce security policy compliance on all devices that attempt to gain access. Your network administrators can use the Cisco NAC Appliance to authent ...
Mirage enables you to control who gains admission to the network, ensuring that uninvited, infected, and out-of-policy endpoints are never allowed to access and harm the network. Our agentless Network Access Control technology performs risk assessment on ...
Total control over those dangerous endpoints Safe Access®—the world's best, most secure network access control (NAC) solution—ensures that compromised, dangerous endpoints don't get on your network and cause havoc. Take the pain out of compliance Yea ...
Sophos Network Access Control (NAC) Advanced safeguards data. NAC Advanced protects information by permitting access to the users who need it and enables companies to create comprehensive security policies to check that any computer accessing the network ...
LANDesk Security Suite lets you automatically detect and deploy security patches with active endpoint security management from a single console. Take active control of endpoint security with support for advanced security management with quarantine, antivi ...
NAP is one of the most desired and highly anticipated features of Microsoft® Windows® Server 2008. NAP is a new platform and solution that controls access to network resources based on a client computer’s identity and compliance with corporate governance ...
Nortel Secure Network Access for the enterprise LAN extends endpoint security-- threat mitigation and policy compliance -- to secure the enterprise LAN infrastructure. Because so many threats are from internal users on the network, endpoint security must ...
Symantec Network Access Control 11.0 securely controls access to corporate networks, enforces endpoint security policy and easily integrates with existing network infrastructures. Regardless of how endpoints connect to the network, Symantec's award-winnin ...
Guests, contractors, vendors, technicians, devices, students, patients – they all need different levels of network access, but existing tools for segmenting the LAN are cumbersome, leave security holes, and can’t scale to meet the increased ...
IT needs to be able to ensure that devices attempting network access are in compliance with corporate security policies, every time, and before they are allowed onto the network. Endpoints that fail to meet policy compliance should be automatically quaran ...
ForeScout CounterACT works with your existing network infrastructure and automatically enforces whatever network access policies you desire for your organisation. Being agentless, and contained in a single appliance, ForeScout CounterACT is easy to instal ...
BigFix is the only policy-driven, unified IT security and operations optimization platform that enables IT.Next levels of real-time visibility and control of all enterprise computing devices. BigFix accomplishes this through a revolutionary massively scal ...
Control access to your network with Trend Micro Network VirusWall Enforcer. This plug-n-protect, agentless network access control (NAC) appliance controls network access by ensuring devices—managed or unmanaged, local or remote—comply with corporate secur ...
PacketFence is an open-source package that provides network access control (NAC). Deployed in academic networks around the world, PacketFence is reliable, extremely configurable, and built upon unmodified open-source code (Fedora, LAMP, Perl, and Snort). ...
Insightix NAC ? Stateful Network Access Control. Insightix NAC delivers stateful network access control, ensuring that only authorized and compliant devices are allowed to access and operate on the enterprise network. Insightix NAC utilizes agentless Sta ...
Enterasys® Network Access Control is a complete standards-based, multi-vendor interoperable pre-connect and post-connect Network Access Control solution. Using Enterasys NAC Controller and/or NAC Gateway appliances with NetSight® NAC Manager configuration ...
Unified Access Control (UAC) is a standards-based, scalable solution for adaptive access control that reduces threat exposure and mitigates risks. It protects your network, guarding mission-critical applications and sensitive data, and providing comprehen ...
Page 1 of 2