Mirage enables you to control who gains admission to the network, ensuring that uninvited, infected, and out-of-policy endpoints are never allowed to access and harm the network. Our agentless Network Access Control technology performs risk assessment on all endpoints ? regardless of IP device type or OS, irrespective of whether an endpoint is managed or unmanaged. As soon as a device attempts to gain access to the network, Mirage immediately identifies the endpoint and runs a quick, effective policy check to determine if the device is infected with damaging threats and whether it complies with the security policies in the network segment that it is trying to join. To verify the identity of users and ensure that uninvited devices don?t gain network access, Mirage authenticates users by checking common credential stores, such as RADIUS and Active Directory. Before granting network access, Mirage determines the device type of the endpoint; whether it is known or unknown; its past policy compliance and threat history; whether it is entering via a wired or wireless connection; and what services are currently running ? such as instant messaging, file transfer protocol services, or peer-to-peer networking. A resulting risk profile is then used to evaluate whether to admit the endpoint to the network, to require it to register on the network, to send it to a designated quarantine server for remediation, or to trigger a combination of additional security checks. For specific network segments, Mirage can be configured to run policy scans that assess risk factors, such as antivirus version, signature update levels, OS patch levels, and the absence or presence of spyware and firewall software. In addition to on-entry scans during network admission, devices can be re-checked throughout their lifecycle on the network. Mirage?s Network Access Control technology is also easily integrated with third-party solutions like Foundstone and Qualys for deeper vulnerability scan capabilities. Going a step beyond identifying a device?s threat posture, Mirage?s admission checks can also be used to identify and immediately block access for high-risk devices, like rogue endpoints and rogue wireless access points. This feature offers another level of Endpoint Control, enabling you to establish an admission policy once and then rest assured that the Mirage appliance is actively enforcing it.