NETWORK ACCESS CONTROL
The modern workplace does not only include employees but also external personnel such as temporary staff, associates and guests who connect their personal devices to the corporate network within the workplace. Organizations are challenged in attempting to control this growing number of devices, which are not associated with a specific user or group, thus compromising the security and integrity of the corporate network.
Devices attempting to connect to your corporate network with limited or no security controls present a constant risk for your organization. With internal attacks on the rise, identity and device visibility are essential, especially during the authentication and authorization phase. Network Access Control (NAC) solutions protect your corporate network by ensuring that all devices comply with your corporate security policy before entering your network. NAC solutions ensure that proper security controls are firmly in place before information exchange is permitted.
We would appreciate your feedback on our new website! Please drop us a line.
Our NAC solutions share the following minimum characteristics:
Provide ongoing visibility and controlled devices information such as what devices are being used, how many, their connection, which operating systems are supported, etc.
Can enforce accurate policies for proper user and device access, regardless of user, device type or location
Ability to detect unusual network behavior at any time and follow that up with automated corrective measures such as blocking traffic and changing the device’s connection status. This is done by utilizing dynamic policy controls and real-threat remediation that extend to third-party systems
Support integration (including real-threat remediation) with third party vendors’ devices (for wired and wireless networks)
Controls and allows only authenticated devices to be connected to the wireless corporate network
Provides granular visibility into all connected devices, even controllers and switches
Offers a visitor management solution for any type of mobile device that delivers secure automated guest access workflows to users on wireless and wired networks
Delivers Enterprise-class endpoint protection, posture assessments and health checks
Drawing from our ever-growing expertise, developed through our Network Infrastructure Solutions and Managed Security Services (MSS) divisions, we first assess your organization’s needs based on your existing infrastructure, network architecture, applications and systems’ setup. Once we have a well-rounded understanding, we proceed by proposing the best-suited NAC solution that suits your environment.
Our suite of post-deployment services is designed to offer further enhancements to your network, systems and applications, as follows:
MAINTENANCE & SUPPORT
INTEGRATION WITH CLEARSKIESTM NG SIEM-AS-A-SERVICE
FULL-FLEDGED 24/7 MANAGED & SECURITY LOG MONITORING
This solution comprises part of the “Test & Assess’’, ‘’Design & Implement”, ‘’Monitor & Respond’’ and ‘’Consulting’’ phases of our Information Security Continuum (ISC).