Network Access Control (NAC)41

Select Up to 5 Products to Compare

  • Product Info
  • Resources
  • Awards
  • Certifications & Compliance
Product Vendor   Description License
Gartner SC Magazine (US) Mosaic Shortlist Tool Mosaic Montage Forrester Awards CC PCIDSS HIPAA ISO FIPS
Alcatel-Lucent SafeNAC Alcatel-Lucent   A fully integrated NAC solution for multi-vendor networks with a variety of managed and non-managed endpoints. Safe NAC provides guest access, host integrity check, and role-based access control to help corporations ensure compliance. Safe NAC is also backed by a global multi-vendor capable professional services organization. Safe NAC has been shown to reduce costs by automating operational processes and minimizing the need for IT operator intervention during the authentication process. There is also simplified troubleshooting and reduced help desk costs which enables a reduction in operational overhead and proactively ensures the health of the network. The solution offers a number of key benefits including full visibility and control of network activity, protection of network assets and mission critical data, ability to enforce user policies in a centralized manner and most importantly, ability to offer guest access. * Access control for guests, LAN and wireless * Endpoint malware protection * Verify OS and end-point configuration * Controls automatic remediation * Role-based post admission control * Audit reports for compliance * Non-disruptive, multi-vendor network deployment * Support for multiple authentication methods, multi-endpoint environments A fully integrated NAC solution for multi-vendor networks with a variety of managed and non-managed endpoints. Safe NAC provides guest access, host... Commercial Read Review   Read Review              
Apani EpiForce Apani Networks   Apani® EpiForce® is a software-based, cross-platform server isolation, encryption and access management solution that enables logical security zoning and policy-based protection of data in motion. EpiForce has a distributed, centrally managed architecture that is transparent to end users, applications and infrastructure, making it quicker to deploy and less costly to manage than hardware-centric solutions. EpiForce Security software delivers cross-platform network security that protects both virtualized and physical environments with a single solution. EpiForce Security is centrally-managed and transparent to users, applications and infrastructure – making it quicker to deploy and less costly to manage than any hardware-centric solution. EpiForce is ideal for: • Remote worker/contractor isolation • PCI-DSS, HIPAA, SOX and CoCo • Mergers, acquisitions and divestitures • Financial institutions, retail stores, health care and public sector Apani® EpiForce® is a software-based, cross-platform server isolation, encryption and access management solution that enables logical security zoning... Commercial     Read Review Read Review            
Auconet Network Access Control (NAC) Auconet   AUCONET is the first provider to offer vendor-independent, comprehensive control for the securing of networks of any size and at any level of heterogeneity. Following a speedy implementation phase – up to 400,000 ports in just a few weeks – you will have a centralized, intuitively operated network access control (NAC) system at your disposal. AUCONET offers you the automated full virtualization of your entire IT environment right up to port level and tells you exactly what device is in what physical condition where - without any costly manual recording: * Vendor-independent * Supports IEEE 802.1X, MAC and PWA authentication * Automated recognition and pinpoint localisation * Visual depiction of your network structure in real time: topologically, geographically and organizationally * Verification and administration of free ports AUCONET is the first provider to offer vendor-independent, comprehensive control for the securing of networks of any size and at any level of... Commercial Read Review   Read Review Read Review            
Avaya Identity Engines portfolio Avaya   The Avaya Identity Engines portfolio integrates with the network infrastructure to provide the central policy decision needed to enforce role-based network access control. These products offer an open, standards-based and holistic network identity management structure. The structure is accomplished by combining the best elements of a next-generation RADIUS/AAA server, the deep directory integration found in application identity offerings, and one of the industry's most advanced policy engines. All this is done out-of-band for maximum scalability and cost effectiveness. This centralized policy engine sits in the data center to provide authentication and authorization for wired, wireless, and VPN network devices. This is combined with a suite of complementary products that enable 802.1X rollouts, to help organizations achieve audit and compliance goals. Identity Engines Ignition Server Identity Engines Ignition Guest Manager Identity Engines Ignition Compliance Portal Identity Engines Ignition Posture Identity Engines Ignition Analytics The Avaya Identity Engines portfolio integrates with the network infrastructure to provide the central policy decision needed to enforce role-based... Commercial Read Review                  
Avenda OnGuard Health Agents Aruba Networks   Avenda has a portfolio of agents - permanent and dissolvable - that enhance the value of Network Access Protection (NAP) from Microsoft through comprehensive endpoint assessment and support for non-Windows operating systems. The OnGuard agents work in both 802.1X and non-802.1X client environments. Avenda has a portfolio of agents - permanent and dissolvable - that enhance the value of Network Access Protection (NAP) from Microsoft through... Commercial Read Review Read Review Read Review Read Review   2011 Finalist for Best Customer Satisfaction of the Year
Network Products Guide
Cool Vendors in Identity and Access Management
Gartner
         
BRADFORD.cloud Bradford Networks   Managed Service Providers, are your customers looking for: Better visibility into who and what is on their network? Safe, secure network access for mobile devices like iPads? A better way to handle network security for employee-owned devices? Bradford has the answer, with its new Bradford.cloud, the only pure SaaS offering for Network Access Control (NAC). Bradford.cloud delivers all of the innovative features of Bradford’s award-winning, on-premise network security offering in a cloud-based SaaS model, with absolutely no hardware or virtual appliance required. Managed Service Providers, are your customers looking for: Better visibility into who and what is on their network? Safe, secure network access for... Commercial Read Review   Read Review Read Review Read Review Finalist for Global Product Excellence Awards -- Endpoint Security
Info Security Products Guide
         
BSA Guest Network Access Overview Insightix   BSA Guest Network Access provides a powerful, simple, cost-effective way to offer guest network access while maintaining the security of your internal network. Guest network access serves many different business purposes. It allows providing limited network access (whether Internet access only and/or selective access to internal resources) for users not part of your organization (partners, contractors, consultants, and so on). With BSA Guest Network Access, you can ensure that guest client devices comply with your network access policies, while automatically denying access from unauthorized, rogue and/or non-complying devices in real-time. BSA Guest Network Access provides a powerful, simple, cost-effective way to offer guest network access while maintaining the security of your internal... Commercial Read Review   Read Review Read Review   2008 Hot Companies
Network Products Guide
         
BSA Network Access Control Insightix   BSA Network Access Control is an easily deployed Network Access Control (NAC) product that provides a powerful, comprehensive, and cost-effective way to control access to the enterprise network, in real-time. It enables authorizing, authenticating, and evaluating devices and users prior to allowing them access to the network. The complex and dynamic nature of enterprise networks and the adoption of new IT technologies, such as virtualization, present an enormous challenge for IT managers. Statistically, an additional 20% to 50% of devices reside on enterprise networks without the organization's knowledge. This uncertainty severely undermines the security of the network as security measures are only partially applied. One cannot defend against or manage devices whose existence is unknown. In order to effectively and successfully deploy and enable access controls against all devices residing on the enterprise network, regardless of their respective capabilities, it is essential to classify devices. For example, knowing whether or not they are capable of user-based authentication (e.g., printer, wireless access points, VoIP phones). The classification determines which verification actions (authorization, authentication, posture evaluation) are to be applied against devices and users accessing the enterprise network before granting them network access. BSA Network Access Control is an easily deployed Network Access Control (NAC) product that provides a powerful, comprehensive, and cost-effective way to... Commercial Read Review   Read Review Read Review   2008 Hot Companies
Network Products Guide
         
Cisco Identity Services Engine Cisco Systems Inc   Govern Your Network with Central Policy Enforcement. Provision and deliver cross-domain application and network services more securely and reliably with Cisco Identity Services Engine (ISE) in all environments-wired, wireless, and VPN. This policy-based service-enablement platform helps ensure corporate and regulatory compliance. Enhance infrastructure security and simplify enterprise service operations. Gather real-time contextual information from the network, users, and devices, and make proactive governance decisions by enforcing policy across the network infrastructure. Cisco Identity Services Engine offers the following benefits. * Security: Get visibility and control over all users and devices on your network. * Compliance: Create consistent policy across the infrastructure for corporate governance. * Efficiency: Increase IT staff productivity by automating labor-intensive tasks and simplifying service delivery. Govern Your Network with Central Policy Enforcement. Provision and deliver cross-domain application and network services more securely and reliably with... Commercial Read Review   Read Review Read Review Read Review          
Cisco NAC Appliance Cisco Systems Inc   Immunize Networks with Policy Enforcement. With Cisco NAC Appliance (formerly Cisco Clean Access), use your organization's network infrastructure to enforce security policy compliance on all devices that attempt to gain access. Best of all, this Network Admission Control (NAC) product is easy to deploy. Your network administrators can use the Cisco NAC Appliance to authenticate, authorize, evaluate, and remediate wired, wireless, and remote users before they can access the network. With Cisco NAC Appliance, you can: Recognize users, their devices, and their roles in the network Evaluate whether machines are compliant with security policies Enforce security policies by blocking, isolating, and repairing noncompliant machines Provide easy and secure guest access Simplify non-authenticating device access Audit and report whom is on the network Immunize Networks with Policy Enforcement. With Cisco NAC Appliance (formerly Cisco Clean Access), use your organization's network infrastructure to... Commercial Read Review   Read Review Read Review Read Review Best Policy Management Application
SC Magazine
SANS WhatWorks - 3.2 Network Access Control (NAC)
SANS
         
Cisco NAC Guest Server Cisco Systems Inc   Provide Full Guest Access. Provide Internet access to visiting customers, contractors, and partners -- without exposing your company's internal infrastructure. Create guest accounts for temporary network access. Cisco NAC Guest Server provides guest policy enforcement to either the Cisco NAC Appliance or the Cisco Wireless LAN Controller, where guest policies are enforced. A core policy component of the Cisco TrustSec solution, it provides full guest access lifecycle support, including provisioning, notification, management, and reporting. Deploy Cisco NAC Guest Server as a component of the Cisco TrustSec solution, either as an integral part of the infrastructure or as an overlay solution. This solution helps IT and security administrators to: * Cut operational costs and reduce the workload for IT and support staff * Improve guest access security by applying consistent policies, reducing human errors, and terminating guest access after each visit * Boost customer and partner productivity and satisfaction, by helping guests easily access online resources * Address compliance and audit requirements by generating guest-user activity and history reports Provide Full Guest Access. Provide Internet access to visiting customers, contractors, and partners -- without exposing your company's internal... Commercial Read Review   Read Review Read Review Read Review Best Policy Management Application
SC Magazine
SANS WhatWorks - 3.2 Network Access Control (NAC)
SANS
         
Cisco NAC Profiler Cisco Systems Inc   Manage Endpoint Devices Automatically. Dynamically discover, identify, and monitor all network-attached endpoints within an enterprise network with Cisco NAC Profiler. It manages these devices intelligently, based on user-defined security policies. You can deploy Cisco NAC Profiler, a core component of the Cisco TrustSec solution, either as an integral part of an 802.1x infrastructure solution or as a Cisco NAC Appliance overlay solution. When deployed as part of a broader Network Admission Control (NAC) implementation, Cisco NAC Profiler facilitates deployment and management of Cisco NAC systems. It discovers and tracks the location and type of all LAN-attached endpoints, including those that cannot authenticate. With Cisco NAC Profiler, your IT and security administrators can: * Simplify deployment of Cisco NAC, by automating device identification and authentication and easing administrative tasks * Facilitate deployment and management of the Cisco ACS 802.1x-based infrastructure or Cisco NAC overlay solutions * Gather endpoint device profiling information and maintain a real-time, contextual inventory of networked devices * Monitor and manage device behavior anomalies, such as port swapping, MAC address spoofing, and profile changes * Secure all company-owned endpoints, including nonauthenticating devices such as printers and IP phones Manage Endpoint Devices Automatically. Dynamically discover, identify, and monitor all network-attached endpoints within an enterprise network with... Commercial Read Review   Read Review Read Review Read Review Best Policy Management Application
SC Magazine
SANS WhatWorks - 3.2 Network Access Control (NAC)
SANS
         
ClearPass Access Management Aruba Networks   ClearPass provides a window into your network and covers all your network security & access control requirements from a single platform. You get complete views of mobile devices and users with total control over what they can access. Best of all, it works with any multivendor infrastructure and is easily extended to network security business and IT systems you already have in place. To improve the end-user experience, ClearPass delivers a wide range of self-service network security capabilities. Users can securely onboard their own devices, sponsor guest Wi-Fi access and even setup sharing for Apple TV and Google Chromecast. All without a single call to your helpdesk. The power of ClearPass network control comes from integrating ultra-scalable AAA with policy management, guest network access, device onboarding, device health checks, with a complete understanding of context. It leverages a user’s role, device, location, application-use and time-of-day to execute custom security policies, accelerate device deployments, and streamline network operations across wired, wireless and VPNs. ClearPass provides a window into your network and covers all your network security & access control requirements from a single platform. You get... Commercial   Read Review       2011 Finalist for Best Customer Satisfaction of the Year
Network Products Guide
Cool Vendors in Identity and Access Management
Gartner
         
CyberGatekeeper Remote  InfoExpress Inc   CyberGatekeeper Remote sits between the remote access point and the corporate network. It audits all networked systems continuously for policy compliance. Unqualified systems attempting to access the network are automatically blocked and redirected for remediation. CyberGatekeeper Remote can detect mobile and fixed endpoint. CyberGatekeeper Remote has the following attributes: * Achieves comprehensive policy compliance * Assists in antivirus and software updates * Continuously audits networked systems * Is fully scalable * Supports centralized management and custom tests * Allows efficient remediation CyberGatekeeper Remote sits between the remote access point and the corporate network. It audits all networked systems continuously for policy... Commercial Read Review   Read Review Read Review   SANS WhatWorks - 3.2 Network Access Control (NAC)
SANS
         
CyberGatekeeper Server  InfoExpress Inc   CyberGatekeeper Server hardens the existing network by only allowing access to authorized devices and reporting and blocking rogue endpoints. Non-compliant endpoints are quarantined until remediation brings them back into compliance. The CyberGatekeeper Server appliance supports multiple methods for managing access to the network. NAC methods include: the new Dynamic NAC enforcement which requires no changes to infrastructure or equipment; 802.1x NAC which uses VLANs; and in-line NAC which uses a bridge to filter traffic in-line. Capabilities provided by CyberGatekeeper Server include: * Authentication using 802.1x or Windows domains * Automatic and interactive remediation * Continuous validation of endpoint compliance * Centralized policy updates and configuration * NAC quarantine methods include Dynamic NAC, 802.1x, and in-line filtering CyberGatekeeper Server hardens the existing network by only allowing access to authorized devices and reporting and blocking rogue endpoints.... Commercial Read Review   Read Review Read Review   SANS WhatWorks - 3.2 Network Access Control (NAC)
SANS
         
Enterasys Network Access Control Enterasys Networks   Enterasys Network Access Control (NAC) is a complete standards-based, multi-vendor interoperable pre-connect and post-connect Network Access Control solution. Using Enterasys NAC Inline Controller and/or NAC Out-of-Band Gateway appliances with Enterasys NMS NAC Manager configuration and reporting software, IT administrators can deploy a leading-edge NAC solution to ensure only the right users have access to the right information from the right place at the right time. Existing investments are protected since no new switching hardware needs to be deployed, and no agent needs to be installed on all of your computers. The Enterasys NAC solution performs multi-user, multi-method authentication, vulnerability assessment and assisted remediation. You have the flexibility of choosing whether or not to restrict access for guests/contractors to public Internet services only–and how to handle authenticated internal users/devices that do not pass the security posture assessment. The Enterasys NAC advantage is business-oriented granular visibility and control over individual users and applications. Enterasys NAC policies permit, deny, prioritize, rate-limit, tag, re-direct and audit network traffic based on user identity, time and location, device type and other environmental variables. Enterasys NAC supports RFC 3580 port and VLAN-based quarantine for Enterasys and third-party switches, plus more powerful Secure Networks™ isolation policies (which prevent compromised endpoints from launching attacks while in the quarantine state) on Enterasys switches. Enterasys Network Access Control (NAC) is a complete standards-based, multi-vendor interoperable pre-connect and post-connect Network Access Control... Commercial Read Review Read Review Read Review Read Review Read Review          
Fiberlink MaaS360 Laptop Management Fiberlink   Whether you’re optimizing your existing laptop management strategy or considering total enterprise device management to include smartphones and tablets, the challenges are the same: dealing with constantly changing users, devices and applications; preventing security risks and illegal information access; aligning user expectations; and asset management. Use MaaS360's Mobile NAC to help make your corporate networks less vulnerable to outside threats. It will enforce strict policies based on the security posture of an endpoint from start-up to shut-down, even while off the corporate network. Whether you’re optimizing your existing laptop management strategy or considering total enterprise device management to include smartphones and tablets,... Commercial     Read Review Read Review            
ForeScout CounterACT ForeScout Technologies   ForeScout CounterACT is an integrated security appliance that provides real-time visibility and control of everything on your network -- all devices, all operating systems, all applications, all users. Over 500 Fortune 1000 enterprises and government/military agencies worldwide use ForeScout CounterACT to improve security and save money through automation. With ForeScout CounterACT, you can: See and control everything on your network -- devices, users, applications Find and fix security gaps Automate guest network access Block rogue devices and unauthorized applications Block attacks inside your network perimeter Protect sensitive data Reduce IT support costs ForeScout CounterACT is an integrated security appliance that provides real-time visibility and control of everything on your network -- all devices,... Commercial Read Review Read Review Read Review Read Review Read Review Winner of Global Product Excellence Awards -- Best Overall Security Company of the Year
Info Security Products Guide
2008 Hot Companies
Network Products Guide
Global Product Excellence in Intrusion Detection/Prevention
Info Security Products Guide
         
Impulse Point Safe Connect Impulse Point   Safe•Connect is the most flexible network access control solution available and offers an easy to implement and support endpoint policy management system. It seamlessly connects into an existing multi-vendor network infrastructure while providing the flexibility to adhere to each organization’s unique computing policy philosophies. Safe•Connect's unique architecture provides a true out-of-line NAC solution that is vendor-independent, scalable, and flexible to meet your growth needs – resulting in reduced time, expense, and risk. Simpler...Vendor-independent with zero network changes or forklift upgrades. Smarter... Out-of-line architecture is five times more scalable. Faster... Only NAC managed service available and installs in hours versus days. Safe•Connect is the most flexible network access control solution available and offers an easy to implement and support endpoint policy management... Commercial Read Review   Read Review Read Review            
iNetSec Inspection Center® PFU Systems, Inc.   iNetSec Inspection Center® provides one of the leading NAC security solutions on the market, including better protection, ease of use and lower deployment and maintenance costs. iNetSec® keeps networks secure from external threats and internal breaches, such as viruses and P2P software, by enforcing security measures on desktops and laptops iNetSec is easy to deploy virtually, making it highly reliable, highly scalable and simple to implement without the need to change existing network designs or purchase new iNetSec is easy to maintain as the solution features automated security policy setting, making it free of human error and requiring minimal administrative resources and costs. iNetSec Inspection Center® provides one of the leading NAC security solutions on the market, including better protection, ease of use and lower... Commercial     Read Review Read Review            
InfoExpress Dynamic NAC Suite InfoExpress Inc   Dynamic NAC is the Network Access Control solution that requires ZERO network changes, making it many times easier and faster to deploy than traditional NAC solutions. Dynamic NAC offers centralized management, flexible policies, granular quarantining and monitoring, and remediation of unhealthy systems. Despite the extensive capabilities provided, Dynamic NAC can install in hours. Without the need to change the network or update network devices, Dynamic NAC has no hidden infrastructure costs and continously checks all devices on the network. Dynamic NAC hardens the existing network by making some of the PCs enforcers, that monitor and control access to the network. Enforcers report and quarantine unauthorized devices, like rogue endpoints and unhealthy PCs. The unhealthy PCs can rejoin the network after automatic or manual remediation brings them into compliance. Dynamic NAC is available as server software for Windows or part of the CyberGatekeeper Server appliance. Dynamic NAC is the Network Access Control solution that requires ZERO network changes, making it many times easier and faster to deploy than traditional... Commercial Read Review Read Review Read Review Read Review   SANS WhatWorks - 3.2 Network Access Control (NAC)
SANS
         
Juniper Unified Access Control Juniper Networks   Unified Access Control (UAC) is a standards-based, scalable network access control solution that reduces network threat exposure and mitigates risks. This network access control solution protects your network by guarding mission-critical applications and sensitive data, identity-enabling your network security, and providing comprehensive network access control, visibility, and monitoring. Unified Access Control reduces the cost and complexity of delivering and deploying granular, identity-enabled network access control from the branch to the corporate data center. This network access control solution addresses most network access control challenges, including insider threats, guest access control, outsourcing, and off-shoring, and regulatory compliance. Unified Access Control (UAC) is a standards-based, scalable network access control solution that reduces network threat exposure and mitigates risks.... Commercial Read Review   Read Review Read Review Read Review Finalist for Global Product Excellence Awards -- Access
Info Security Products Guide
Best endpoint security solution
SC Magazine
         
LANenforcer 2024/2124 Security Appliance Nevis Networks   The LANenforcer 2024 and 2124 LAN Security Appliances transparently integrate into existing network infrastructures, sitting between existing switches at the access and distribution layers. The LANenforcer Appliance is an ideal solution for organizations that need an added layer of security within the LAN and want to quickly and easily roll it out to a large number of users. It is designed as a drop-in solution, and requires no configuration changes to the physical or logical network topology. The security and access control benefits that LANenforcer appliances provide are achieved with no requirement for client software, making integration into existing networks easy and fast. A single LANenforcer security appliance can support up to 10,000 users, making it extremely cost-effective when compared to other less capable point solutions. For the price of a single appliance, the LANenforcer appliance combines comprehensive access control, threat containment and user monitoring, while enforcing corporate security policies down to the individual user. The LANenforcer security appliance detects a broad range of known threats such as Worms, Spyware, Adware, Bots, Trojans, and DoS attacks, while also protecting against previously unknown, or 'day zero' threats without adding significant latency to the network. Infected user endpoints are quarantined in microseconds without disrupting other users on the network, providing a significant improvement over the use of VLANs or zone approaches for threat containment. The LANenforcer 2024 and 2124 LAN Security Appliances transparently integrate into existing network infrastructures, sitting between existing switches... Commercial     Read Review Read Review            
Lan-Secure Switch Protector Lan-Secure   Switch Protector is add-on engine of Switch Center software that provides Network Access Control (NAC) features on any managed network switches and hubs from any vendor supporting SNMP BRIDGE-MIB and helps to protect networks from potential intruders, unauthorized connections and malicious activities. Switch Protector Network Access Control (NAC) software engine implements IEEE-802.1X features without the need for any special considerations for network switches or workstations. The software powerful engine provides real-rime intrusion detection and prevention based on selectable proven protection techniques including network nodes properties, activity and installed components. The software protection methods and rules can enforce any network security policy and can be implemented on all network switches or on specific selectable switches. The built-in central viewer supports multiple management levels including E-mail alerts, SNMP traps and SYSLOG notifications that provides maximum administration control and management capabilities. Switch Protector key features: * Network access control (NAC) software using online detection and SNMP traps. * Network access detection of new MAC addresses and switch ports location changes. * Network access protection against spoofing addresses that access as authorized nodes. * Network access security for organization policy enforcement on end-users workstations. * Network policy enforcement using linkup WMI properties and external remote scripts. * Network access prevention using SNMP or any other script like Telnet or SSH. * Network access control management using standard intranet web interface. * Email messages, SNMP traps and SYSLOG notifications alerts. * Online administration with email access control protection. * Daily and weekly e-mail reports. Switch Protector is add-on engine of Switch Center software that provides Network Access Control (NAC) features on any managed network switches and hubs... Commercial     Read Review Read Review            
Mancala Network Controller Mancala Networks   A vendor agnostic context aware network control and management platform that combines automated discovery, device profiling and real-time policy enforcement into a solution that is easy to deploy and to use. The Network Controller interfaces transparently with the existing control protocols (DNS, DHCP, RADIUS, SIP,...) in order to build a shared view of the network state. The Network Controller combines this intelligent network context awareness with automated device profiling and a policy engine in order to enforce policies in real-time throughout the network. Facilitates B.Y.O.D. deployments. A vendor agnostic context aware network control and management platform that combines automated discovery, device profiling and real-time policy... Commercial     Read Review Read Review            

Loading...