Network Access Control (NAC)39

Select Up to 5 Products to Compare

  • Product Info
  • Resources
  • Awards
  • Certifications & Compliance
Product Vendor   Description License
Gartner Mosaic Shortlist Tool Mosaic Montage SC Magazine (US) Forrester Awards CC PCIDSS HIPAA ISO FIPS
Recently Updated  
LANenforcer 2024/2124 Security Appliance Nevis Networks   The LANenforcer 2024 and 2124 LAN Security Appliances transparently integrate into existing network infrastructures, sitting between existing switches at the access and distribution layers. The LANenforcer Appliance is an ideal solution for organizations that need an added layer of security within the LAN and want to quickly and easily roll it out to a large number of users. It is designed as a drop-in solution, and requires no configuration changes to the physical or logical network topology. The security and access control benefits that LANenforcer appliances provide are achieved with no requirement for client software, making integration into existing networks easy and fast. A single LANenforcer security appliance can support up to 10,000 users, making it extremely cost-effective when compared to other less capable point solutions. For the price of a single appliance, the LANenforcer appliance combines comprehensive access control, threat containment and user monitoring, while enforcing corporate security policies down to the individual user. The LANenforcer security appliance detects a broad range of known threats such as Worms, Spyware, Adware, Bots, Trojans, and DoS attacks, while also protecting against previously unknown, or 'day zero' threats without adding significant latency to the network. Infected user endpoints are quarantined in microseconds without disrupting other users on the network, providing a significant improvement over the use of VLANs or zone approaches for threat containment. The LANenforcer 2024 and 2124 LAN Security Appliances transparently integrate into existing network infrastructures, sitting between existing switches... Commercial   Read Review Read Review              
Alcatel-Lucent SafeNAC Alcatel-Lucent   A fully integrated NAC solution for multi-vendor networks with a variety of managed and non-managed endpoints. Safe NAC provides guest access, host integrity check, and role-based access control to help corporations ensure compliance. Safe NAC is also backed by a global multi-vendor capable professional services organization. Safe NAC has been shown to reduce costs by automating operational processes and minimizing the need for IT operator intervention during the authentication process. There is also simplified troubleshooting and reduced help desk costs which enables a reduction in operational overhead and proactively ensures the health of the network. The solution offers a number of key benefits including full visibility and control of network activity, protection of network assets and mission critical data, ability to enforce user policies in a centralized manner and most importantly, ability to offer guest access. * Access control for guests, LAN and wireless * Endpoint malware protection * Verify OS and end-point configuration * Controls automatic remediation * Role-based post admission control * Audit reports for compliance * Non-disruptive, multi-vendor network deployment * Support for multiple authentication methods, multi-endpoint environments A fully integrated NAC solution for multi-vendor networks with a variety of managed and non-managed endpoints. Safe NAC provides guest access, host... Commercial Read Review Read Review                
Apani EpiForce Apani Networks   Apani® EpiForce® is a software-based, cross-platform server isolation, encryption and access management solution that enables logical security zoning and policy-based protection of data in motion. EpiForce has a distributed, centrally managed architecture that is transparent to end users, applications and infrastructure, making it quicker to deploy and less costly to manage than hardware-centric solutions. EpiForce Security software delivers cross-platform network security that protects both virtualized and physical environments with a single solution. EpiForce Security is centrally-managed and transparent to users, applications and infrastructure – making it quicker to deploy and less costly to manage than any hardware-centric solution. EpiForce is ideal for: • Remote worker/contractor isolation • PCI-DSS, HIPAA, SOX and CoCo • Mergers, acquisitions and divestitures • Financial institutions, retail stores, health care and public sector Apani® EpiForce® is a software-based, cross-platform server isolation, encryption and access management solution that enables logical security zoning... Commercial   Read Review Read Review              
Auconet Network Access Control (NAC) Auconet   AUCONET is the first provider to offer vendor-independent, comprehensive control for the securing of networks of any size and at any level of heterogeneity. Following a speedy implementation phase – up to 400,000 ports in just a few weeks – you will have a centralized, intuitively operated network access control (NAC) system at your disposal. AUCONET offers you the automated full virtualization of your entire IT environment right up to port level and tells you exactly what device is in what physical condition where - without any costly manual recording: * Vendor-independent * Supports IEEE 802.1X, MAC and PWA authentication * Automated recognition and pinpoint localisation * Visual depiction of your network structure in real time: topologically, geographically and organizationally * Verification and administration of free ports AUCONET is the first provider to offer vendor-independent, comprehensive control for the securing of networks of any size and at any level of... Commercial Read Review Read Review Read Review              
Avenda OnGuard Health Agents Aruba Networks   Avenda has a portfolio of agents - permanent and dissolvable - that enhance the value of Network Access Protection (NAP) from Microsoft through comprehensive endpoint assessment and support for non-Windows operating systems. The OnGuard agents work in both 802.1X and non-802.1X client environments. Avenda has a portfolio of agents - permanent and dissolvable - that enhance the value of Network Access Protection (NAP) from Microsoft through... Commercial Read Review Read Review Read Review Read Review   2011 Finalist for Best Customer Satisfaction of the Year
Network Products Guide
Cool Vendors in Identity and Access Management
Gartner
         
BRADFORD.cloud Bradford Networks   Managed Service Providers, are your customers looking for: Better visibility into who and what is on their network? Safe, secure network access for mobile devices like iPads? A better way to handle network security for employee-owned devices? Bradford has the answer, with its new Bradford.cloud, the only pure SaaS offering for Network Access Control (NAC). Bradford.cloud delivers all of the innovative features of Bradford’s award-winning, on-premise network security offering in a cloud-based SaaS model, with absolutely no hardware or virtual appliance required. Managed Service Providers, are your customers looking for: Better visibility into who and what is on their network? Safe, secure network access for... Commercial Read Review Read Review Read Review   Read Review Finalist for Global Product Excellence Awards -- Endpoint Security
Info Security Products Guide
         
BSA Guest Network Access Overview Insightix   BSA Guest Network Access provides a powerful, simple, cost-effective way to offer guest network access while maintaining the security of your internal network. Guest network access serves many different business purposes. It allows providing limited network access (whether Internet access only and/or selective access to internal resources) for users not part of your organization (partners, contractors, consultants, and so on). With BSA Guest Network Access, you can ensure that guest client devices comply with your network access policies, while automatically denying access from unauthorized, rogue and/or non-complying devices in real-time. BSA Guest Network Access provides a powerful, simple, cost-effective way to offer guest network access while maintaining the security of your internal... Commercial Read Review Read Review Read Review     2008 Hot Companies
Network Products Guide
         
BSA Network Access Control Insightix   BSA Network Access Control is an easily deployed Network Access Control (NAC) product that provides a powerful, comprehensive, and cost-effective way to control access to the enterprise network, in real-time. It enables authorizing, authenticating, and evaluating devices and users prior to allowing them access to the network. The complex and dynamic nature of enterprise networks and the adoption of new IT technologies, such as virtualization, present an enormous challenge for IT managers. Statistically, an additional 20% to 50% of devices reside on enterprise networks without the organization's knowledge. This uncertainty severely undermines the security of the network as security measures are only partially applied. One cannot defend against or manage devices whose existence is unknown. In order to effectively and successfully deploy and enable access controls against all devices residing on the enterprise network, regardless of their respective capabilities, it is essential to classify devices. For example, knowing whether or not they are capable of user-based authentication (e.g., printer, wireless access points, VoIP phones). The classification determines which verification actions (authorization, authentication, posture evaluation) are to be applied against devices and users accessing the enterprise network before granting them network access. BSA Network Access Control is an easily deployed Network Access Control (NAC) product that provides a powerful, comprehensive, and cost-effective way to... Commercial Read Review Read Review Read Review     2008 Hot Companies
Network Products Guide
         
Cisco Identity Services Engine Cisco Systems Inc   Govern Your Network with Central Policy Enforcement. Provision and deliver cross-domain application and network services more securely and reliably with Cisco Identity Services Engine (ISE) in all environments-wired, wireless, and VPN. This policy-based service-enablement platform helps ensure corporate and regulatory compliance. Enhance infrastructure security and simplify enterprise service operations. Gather real-time contextual information from the network, users, and devices, and make proactive governance decisions by enforcing policy across the network infrastructure. Cisco Identity Services Engine offers the following benefits. * Security: Get visibility and control over all users and devices on your network. * Compliance: Create consistent policy across the infrastructure for corporate governance. * Efficiency: Increase IT staff productivity by automating labor-intensive tasks and simplifying service delivery. Govern Your Network with Central Policy Enforcement. Provision and deliver cross-domain application and network services more securely and reliably with... Commercial Read Review Read Review Read Review   Read Review          
Cisco NAC Appliance Cisco Systems Inc   Immunize Networks with Policy Enforcement. With Cisco NAC Appliance (formerly Cisco Clean Access), use your organization's network infrastructure to enforce security policy compliance on all devices that attempt to gain access. Best of all, this Network Admission Control (NAC) product is easy to deploy. Your network administrators can use the Cisco NAC Appliance to authenticate, authorize, evaluate, and remediate wired, wireless, and remote users before they can access the network. With Cisco NAC Appliance, you can: Recognize users, their devices, and their roles in the network Evaluate whether machines are compliant with security policies Enforce security policies by blocking, isolating, and repairing noncompliant machines Provide easy and secure guest access Simplify non-authenticating device access Audit and report whom is on the network Immunize Networks with Policy Enforcement. With Cisco NAC Appliance (formerly Cisco Clean Access), use your organization's network infrastructure to... Commercial Read Review Read Review Read Review   Read Review Best Policy Management Application
SC Magazine
SANS WhatWorks - 3.2 Network Access Control (NAC)
SANS
         
Cisco NAC Guest Server Cisco Systems Inc   Provide Full Guest Access. Provide Internet access to visiting customers, contractors, and partners -- without exposing your company's internal infrastructure. Create guest accounts for temporary network access. Cisco NAC Guest Server provides guest policy enforcement to either the Cisco NAC Appliance or the Cisco Wireless LAN Controller, where guest policies are enforced. A core policy component of the Cisco TrustSec solution, it provides full guest access lifecycle support, including provisioning, notification, management, and reporting. Deploy Cisco NAC Guest Server as a component of the Cisco TrustSec solution, either as an integral part of the infrastructure or as an overlay solution. This solution helps IT and security administrators to: * Cut operational costs and reduce the workload for IT and support staff * Improve guest access security by applying consistent policies, reducing human errors, and terminating guest access after each visit * Boost customer and partner productivity and satisfaction, by helping guests easily access online resources * Address compliance and audit requirements by generating guest-user activity and history reports Provide Full Guest Access. Provide Internet access to visiting customers, contractors, and partners -- without exposing your company's internal... Commercial Read Review Read Review Read Review   Read Review Best Policy Management Application
SC Magazine
SANS WhatWorks - 3.2 Network Access Control (NAC)
SANS
         
Cisco NAC Profiler Cisco Systems Inc   Manage Endpoint Devices Automatically. Dynamically discover, identify, and monitor all network-attached endpoints within an enterprise network with Cisco NAC Profiler. It manages these devices intelligently, based on user-defined security policies. You can deploy Cisco NAC Profiler, a core component of the Cisco TrustSec solution, either as an integral part of an 802.1x infrastructure solution or as a Cisco NAC Appliance overlay solution. When deployed as part of a broader Network Admission Control (NAC) implementation, Cisco NAC Profiler facilitates deployment and management of Cisco NAC systems. It discovers and tracks the location and type of all LAN-attached endpoints, including those that cannot authenticate. With Cisco NAC Profiler, your IT and security administrators can: * Simplify deployment of Cisco NAC, by automating device identification and authentication and easing administrative tasks * Facilitate deployment and management of the Cisco ACS 802.1x-based infrastructure or Cisco NAC overlay solutions * Gather endpoint device profiling information and maintain a real-time, contextual inventory of networked devices * Monitor and manage device behavior anomalies, such as port swapping, MAC address spoofing, and profile changes * Secure all company-owned endpoints, including nonauthenticating devices such as printers and IP phones Manage Endpoint Devices Automatically. Dynamically discover, identify, and monitor all network-attached endpoints within an enterprise network with... Commercial Read Review Read Review Read Review   Read Review Best Policy Management Application
SC Magazine
SANS WhatWorks - 3.2 Network Access Control (NAC)
SANS
         
CyberGatekeeper Remote  InfoExpress Inc   CyberGatekeeper Remote sits between the remote access point and the corporate network. It audits all networked systems continuously for policy compliance. Unqualified systems attempting to access the network are automatically blocked and redirected for remediation. CyberGatekeeper Remote can detect mobile and fixed endpoint. CyberGatekeeper Remote has the following attributes: * Achieves comprehensive policy compliance * Assists in antivirus and software updates * Continuously audits networked systems * Is fully scalable * Supports centralized management and custom tests * Allows efficient remediation CyberGatekeeper Remote sits between the remote access point and the corporate network. It audits all networked systems continuously for policy... Commercial Read Review Read Review Read Review     SANS WhatWorks - 3.2 Network Access Control (NAC)
SANS
         
CyberGatekeeper Server  InfoExpress Inc   CyberGatekeeper Server hardens the existing network by only allowing access to authorized devices and reporting and blocking rogue endpoints. Non-compliant endpoints are quarantined until remediation brings them back into compliance. The CyberGatekeeper Server appliance supports multiple methods for managing access to the network. NAC methods include: the new Dynamic NAC enforcement which requires no changes to infrastructure or equipment; 802.1x NAC which uses VLANs; and in-line NAC which uses a bridge to filter traffic in-line. Capabilities provided by CyberGatekeeper Server include: * Authentication using 802.1x or Windows domains * Automatic and interactive remediation * Continuous validation of endpoint compliance * Centralized policy updates and configuration * NAC quarantine methods include Dynamic NAC, 802.1x, and in-line filtering CyberGatekeeper Server hardens the existing network by only allowing access to authorized devices and reporting and blocking rogue endpoints.... Commercial Read Review Read Review Read Review     SANS WhatWorks - 3.2 Network Access Control (NAC)
SANS
         
Enterasys Network Access Control Enterasys Networks   Enterasys Network Access Control (NAC) is a complete standards-based, multi-vendor interoperable pre-connect and post-connect Network Access Control solution. Using Enterasys NAC Inline Controller and/or NAC Out-of-Band Gateway appliances with Enterasys NMS NAC Manager configuration and reporting software, IT administrators can deploy a leading-edge NAC solution to ensure only the right users have access to the right information from the right place at the right time. Existing investments are protected since no new switching hardware needs to be deployed, and no agent needs to be installed on all of your computers. The Enterasys NAC solution performs multi-user, multi-method authentication, vulnerability assessment and assisted remediation. You have the flexibility of choosing whether or not to restrict access for guests/contractors to public Internet services only–and how to handle authenticated internal users/devices that do not pass the security posture assessment. The Enterasys NAC advantage is business-oriented granular visibility and control over individual users and applications. Enterasys NAC policies permit, deny, prioritize, rate-limit, tag, re-direct and audit network traffic based on user identity, time and location, device type and other environmental variables. Enterasys NAC supports RFC 3580 port and VLAN-based quarantine for Enterasys and third-party switches, plus more powerful Secure Networks™ isolation policies (which prevent compromised endpoints from launching attacks while in the quarantine state) on Enterasys switches. Enterasys Network Access Control (NAC) is a complete standards-based, multi-vendor interoperable pre-connect and post-connect Network Access Control... Commercial Read Review Read Review Read Review Read Review Read Review          
Fiberlink MaaS360 Laptop Management Fiberlink   Whether you’re optimizing your existing laptop management strategy or considering total enterprise device management to include smartphones and tablets, the challenges are the same: dealing with constantly changing users, devices and applications; preventing security risks and illegal information access; aligning user expectations; and asset management. Use MaaS360's Mobile NAC to help make your corporate networks less vulnerable to outside threats. It will enforce strict policies based on the security posture of an endpoint from start-up to shut-down, even while off the corporate network. Whether you’re optimizing your existing laptop management strategy or considering total enterprise device management to include smartphones and tablets,... Commercial   Read Review Read Review              
ForeScout CounterACT ForeScout Technologies   ForeScout CounterACT is an integrated security appliance that provides real-time visibility and control of everything on your network -- all devices, all operating systems, all applications, all users. Over 500 Fortune 1000 enterprises and government/military agencies worldwide use ForeScout CounterACT to improve security and save money through automation. With ForeScout CounterACT, you can: See and control everything on your network -- devices, users, applications Find and fix security gaps Automate guest network access Block rogue devices and unauthorized applications Block attacks inside your network perimeter Protect sensitive data Reduce IT support costs ForeScout CounterACT is an integrated security appliance that provides real-time visibility and control of everything on your network -- all devices,... Commercial Read Review Read Review Read Review Read Review Read Review Winner of Global Product Excellence Awards -- Best Overall Security Company of the Year
Info Security Products Guide
2008 Hot Companies
Network Products Guide
Global Product Excellence in Intrusion Detection/Prevention
Info Security Products Guide
         
Impulse Point Safe Connect Impulse Point   Safe•Connect is the most flexible network access control solution available and offers an easy to implement and support endpoint policy management system. It seamlessly connects into an existing multi-vendor network infrastructure while providing the flexibility to adhere to each organization’s unique computing policy philosophies. Safe•Connect's unique architecture provides a true out-of-line NAC solution that is vendor-independent, scalable, and flexible to meet your growth needs – resulting in reduced time, expense, and risk. Simpler...Vendor-independent with zero network changes or forklift upgrades. Smarter... Out-of-line architecture is five times more scalable. Faster... Only NAC managed service available and installs in hours versus days. Safe•Connect is the most flexible network access control solution available and offers an easy to implement and support endpoint policy management... Commercial Read Review Read Review Read Review              
iNetSec Inspection Center® PFU Systems, Inc.   iNetSec Inspection Center® provides one of the leading NAC security solutions on the market, including better protection, ease of use and lower deployment and maintenance costs. iNetSec® keeps networks secure from external threats and internal breaches, such as viruses and P2P software, by enforcing security measures on desktops and laptops iNetSec is easy to deploy virtually, making it highly reliable, highly scalable and simple to implement without the need to change existing network designs or purchase new iNetSec is easy to maintain as the solution features automated security policy setting, making it free of human error and requiring minimal administrative resources and costs. iNetSec Inspection Center® provides one of the leading NAC security solutions on the market, including better protection, ease of use and lower... Commercial   Read Review Read Review              
InfoExpress Dynamic NAC Suite InfoExpress Inc   Dynamic NAC is the Network Access Control solution that requires ZERO network changes, making it many times easier and faster to deploy than traditional NAC solutions. Dynamic NAC offers centralized management, flexible policies, granular quarantining and monitoring, and remediation of unhealthy systems. Despite the extensive capabilities provided, Dynamic NAC can install in hours. Without the need to change the network or update network devices, Dynamic NAC has no hidden infrastructure costs and continously checks all devices on the network. Dynamic NAC hardens the existing network by making some of the PCs enforcers, that monitor and control access to the network. Enforcers report and quarantine unauthorized devices, like rogue endpoints and unhealthy PCs. The unhealthy PCs can rejoin the network after automatic or manual remediation brings them into compliance. Dynamic NAC is available as server software for Windows or part of the CyberGatekeeper Server appliance. Dynamic NAC is the Network Access Control solution that requires ZERO network changes, making it many times easier and faster to deploy than traditional... Commercial Read Review Read Review Read Review Read Review   SANS WhatWorks - 3.2 Network Access Control (NAC)
SANS
         
Juniper Unified Access Control Juniper Networks   Unified Access Control (UAC) is a standards-based, scalable network access control solution that reduces network threat exposure and mitigates risks. This network access control solution protects your network by guarding mission-critical applications and sensitive data, identity-enabling your network security, and providing comprehensive network access control, visibility, and monitoring. Unified Access Control reduces the cost and complexity of delivering and deploying granular, identity-enabled network access control from the branch to the corporate data center. This network access control solution addresses most network access control challenges, including insider threats, guest access control, outsourcing, and off-shoring, and regulatory compliance. Unified Access Control (UAC) is a standards-based, scalable network access control solution that reduces network threat exposure and mitigates risks.... Commercial Read Review Read Review Read Review   Read Review Finalist for Global Product Excellence Awards -- Access
Info Security Products Guide
Best endpoint security solution
SC Magazine
         
Lan-Secure Switch Protector Lan-Secure   Switch Protector is add-on engine of Switch Center software that provides Network Access Control (NAC) features on any managed network switches and hubs from any vendor supporting SNMP BRIDGE-MIB and helps to protect networks from potential intruders, unauthorized connections and malicious activities. Switch Protector Network Access Control (NAC) software engine implements IEEE-802.1X features without the need for any special considerations for network switches or workstations. The software powerful engine provides real-rime intrusion detection and prevention based on selectable proven protection techniques including network nodes properties, activity and installed components. The software protection methods and rules can enforce any network security policy and can be implemented on all network switches or on specific selectable switches. The built-in central viewer supports multiple management levels including E-mail alerts, SNMP traps and SYSLOG notifications that provides maximum administration control and management capabilities. Switch Protector key features: * Network access control (NAC) software using online detection and SNMP traps. * Network access detection of new MAC addresses and switch ports location changes. * Network access protection against spoofing addresses that access as authorized nodes. * Network access security for organization policy enforcement on end-users workstations. * Network policy enforcement using linkup WMI properties and external remote scripts. * Network access prevention using SNMP or any other script like Telnet or SSH. * Network access control management using standard intranet web interface. * Email messages, SNMP traps and SYSLOG notifications alerts. * Online administration with email access control protection. * Daily and weekly e-mail reports. Switch Protector is add-on engine of Switch Center software that provides Network Access Control (NAC) features on any managed network switches and hubs... Commercial   Read Review Read Review              
Mancala Network Controller Mancala Networks   A vendor agnostic context aware network control and management platform that combines automated discovery, device profiling and real-time policy enforcement into a solution that is easy to deploy and to use. The Network Controller interfaces transparently with the existing control protocols (DNS, DHCP, RADIUS, SIP,...) in order to build a shared view of the network state. The Network Controller combines this intelligent network context awareness with automated device profiling and a policy engine in order to enforce policies in real-time throughout the network. Facilitates B.Y.O.D. deployments. A vendor agnostic context aware network control and management platform that combines automated discovery, device profiling and real-time policy... Commercial   Read Review Read Review              
McAfee Network Access Control McAfee, Inc   McAfee Network Access Control software for managed endpoints provides the benefits of access control while adapting to your business and infrastructure. Compliance enforcement — In addition to limiting network access for risky systems such as visitor and contractor laptops, you can enforce compliance of managed systems (those with an agent already installed) to ensure users do not disable security tools, install malicious applications, or use outdated security configurations. McAfee ensures that your investments in security tools and policy development are protected and not bypassed or disabled by self-administering users. Network Access Control software support — McAfee Network Access Control software supports managed users, including employees, contractors, and remote users, and offers employee endpoint health assessments to ensure that managed systems are compliant prior to admission. With the McAfee ePolicy Orchestrator and Network Access Control software, we help you detect rogue and unknown devices, and remediate security issues. Providing essential Network Access Control functionality — With the integrated McAfee Network Access Control Appliance, you can provide identity-based and application-based access control for unmanaged endpoints, such as guests and contractors. You can also add essential Network Access Control functionality to the McAfee Network Security Platform to implement post-admission monitoring and network enforcement to McAfee’s industry-leading intrusion prevention system. McAfee Network Access Control software for managed endpoints provides the benefits of access control while adapting to your business and... Commercial Read Review Read Review Read Review Read Review Read Review SANS WhatWorks - 3.2 Network Access Control (NAC)
SANS
         
NetClarity NACwall NetClarity, Inc   NetClarity’s NACwalls appliances are designed to harden your network and provide immediate threat assessment and remediation capabilities. This ensures compliance to the most stringent regulatory guidelines while thwarting malicious attempts to gain access to your network data. Our NACwall appliances can increase the quality of your audit and compliance reporting and decrease the time, effort and expense in doing so. They provide real-time internal network access control with e-mail, cell-phone paging, syslog and snmp traps reporting and logging capabilities. Make network access control, vulnerability audits and regulatory compliance simple, automated and real-time with the addition of a NetClarity NACwall NG. The wall mountable Nano unit is easy to deploy without any infrastructure changes. Plug it in. Turn it on. Configure it. Manage it from NACwall Enterprise units. Inside-out Network Security made faster, easier and more cost-effective than any other NAC solution in the marketplace. NetClarity’s NACwalls appliances are designed to harden your network and provide immediate threat assessment and remediation capabilities. This ensures... Commercial   Read Review Read Review Read Review   Winner of Global Product Excellence Awards -- New Products and Upgrades, Innovative Products
Info Security Products Guide
2009 Hot Companies
Network Products Guide
Product Innovation - Network Access Control
Network Products Guide
         
Network Sentry Solutions Bradford Networks   Effectively manage security policies, prevent unauthorized network access, enhance existing security systems and secure critical IT assets with Bradford’s Network Sentry Family. This comprehensive, extensible network security platform delivers powerful solutions that address today’s security challenges, including: * Providing visibility of all network connections * Protecting the network from unauthorized users and devices * Ensuring that security policies are established and enforced * Detecting and profiling managed and unmanaged devices * Allowing role-based access to network resources * Provisioning and managing guest access * Maximizing existing security systems and network infrastructure * Eliminating endpoint vulnerability Network Sentry includes: Bradford Networks Mobile Agent App now available in Apple’s App Store App enables secure network access for iPads, iPhones Automatically differentiating between corporate and personal devices With the Network Sentry Family, you gain complete visibility of all users and devices on your network. Identify who and what is on your network, keep unwanted and unauthorized users and devices out, and ensure that network assets are safe. Effectively manage security policies, prevent unauthorized network access, enhance existing security systems and secure critical IT assets with... Commercial Read Review Read Review Read Review Read Review Read Review Finalist for Global Product Excellence Awards -- Endpoint Security
Info Security Products Guide
2008 Hot Companies
Network Products Guide
         

Loading...