Network Access Control

The modern workplace does not only include employees but also external personnel such as temporary staff, associates and guests who connect their personal devices to the corporate network within the workplace. Organizations are challenged in attempting to control this growing number of devices, which are not associated with a specific user or group, thus compromising the security and integrity of the corporate network.

We would appreciate your feedback on our new website!

Please drop us a line

Overview

Devices attempting to connect to your corporate network with limited or no security controls present a constant risk for your organization. With internal attacks on the rise, identity and device visibility are essential, especially during the authentication and authorization phase. Network Access Control (NAC) solutions protect your corporate network by ensuring that all devices comply with your corporate security policy before entering your network. NAC solutions ensure that proper security controls are firmly in place before information exchange is permitted.

Characteristics

Our NAC solutions share the following minimum characteristics:
Minimize Risk
Provide ongoing visibility and controlled devices information such as what devices are being used, how many, their connection, which operating systems are supported, etc.
Highly Effective
Can enforce accurate policies for proper user and device access, regardless of user, device type or location
Optimal Protection
Ability to detect unusual network behavior at any time and follow that up with automated corrective measures such as blocking traffic and changing the device’s connection status. This is done by utilizing dynamic policy controls and real-threat remediation that extend to third-party systems
Flexibility
Support integration (including real-threat remediation) with third party vendors’ devices (for wired and wireless networks)

Features

Access Control
Controls and allows only authenticated devices to be connected to the wireless corporate network
Profiling
Provides granular visibility into all connected devices, even controllers and switches
Guest Access
Offers a visitor management solution for any type of mobile device that delivers secure automated guest access workflows to users on wireless and wired networks
Endpoint Health
Delivers Enterprise-class endpoint protection, posture assessments and health checks

Deployment

Drawing from our ever-growing expertise, developed through our Network Infrastructure Solutions and Managed Security Services (MSS) divisions, we first assess your organization’s needs based on your existing infrastructure, network architecture, applications and systems’ setup. Once we have a well-rounded understanding, we proceed by proposing the best-suited NAC solution that suits your environment.

Remaining Secure

Our suite of post-deployment services is designed to offer further enhancements to your network, systems and applications, as follows:

Maintenance & Support

Integration with ClearSkiesTM NG SIEM-as-a-Service

Full-fledged 24/7 Managed & Security Log monitoring

This solution comprises part of the “Test & Assess’’, ‘’Design & Implement”, ‘’Monitor & Respond’’ and ‘’Consulting’’ phases of our Information Security Continuum (ISC).