Network Access Control. Simplified.

Cloud-Delivered & On-Premise NAC Solutions for WiFi, Wired Ports & Remote Access.

The Importance of a Network Access Control Solution

The enterprise computing landscape has shifted significantly since network access control (NAC) solutions were first introduced. Originally created to control access for devices connecting over the wired network, NAC is effective at knowing when devices connect, and controlling their access based on pre-defined security policies. Rapid innovation in the wireless network over the past decade, together with mobile device technology and Internet of Things, has made it so that the enterprise hardly depends on wired-only systems to achieve its business bottom line, causing the capabilities of NAC solutions to evolve.

Evidenced in the fact that NAC solutions address the Top Five Center for Internet Security (CIS) Controls, it seems that the rapid pace of technological innovation cannot outpace the relevance of NAC solutions. NAC solutions address:

CIS Control 1: Inventory of Authorized and Unauthorized Devices

How NAC Helps :

NAC solutions can see all the hardware devices on the network, allowing for total inventory and control.

CIS Control 2: Inventory of Authorized and Unauthorized Software

How NAC Helps :

NAC solutions gather information on the software installed on endpoints.

CIS Control 3: Secure Configurations for Hardware and Software

How NAC Helps :

NAC solutions can inspect configurations on any endpoints connected to the network.

CIS Control 4: Continuous Vulnerability Assessment and Remediation

How NAC Helps :

Most NAC solutions allow for continuous compliance validations and remediation measures for connected devices.

CIS Control 5: Controlled Use of Administrative Privileges

How NAC Helps :

Role-based access control makes it possible to control use of administrative privileges based on pre-defined roles.

Network security coverage NAC solutions provide:

Visibility into Network Connections:

See and gain insights into every device connecting to the network, and gain actionable intelligence that can be used to optimize network security policies in consideration of threats.

Controlled Access:

By setting security policies to control access across the network, organizations can keep malicious devices off the network, thereby controlling exposure to cybersecurity threats and digital business risks.

Unified Management:

Simplification of tasks for network and security administrators by providing the ability to both see and control connected devices, set automated controls and remediation procedures.

Internet of Things Security:

Gain control over IoT devices and their level of security when connecting to the network with the help of agentless NAC solutions.

Compliance:

NAC solutions help organizations meet a growing body of compliance standards such as PCI-DDS, SOX, HIPAA, and more. Easily perform auditing checks and compile reports.

Integrations:

NAC solutions can easily integrate with existing architecture and share data with other security vendors such as MDM, IPS, SIEM, and more. Using the alerts from integrated solutions, respond faster and with accuracy to threats or changes in the network status.

Network Access Control. Simplified.

Cloud-Delivered & On-Premise NAC Solutions for WiFi, Wired Ports & Remote Access.

The Importance of a Network Access Control Solution

The enterprise computing landscape has shifted significantly since network access control (NAC) solutions were first introduced. Originally created to control access for devices connecting over the wired network, NAC is effective at knowing when devices connect, and controlling their access based on pre-defined security policies. Rapid innovation in the wireless network over the past decade, together with mobile device technology and Internet of Things, has made it so that the enterprise hardly depends on wired-only systems to achieve its business bottom line, causing the capabilities of NAC solutions to evolve.

Evidenced in the fact that NAC solutions address the Top Five Center for Internet Security (CIS) Controls, it seems that the rapid pace of technological innovation cannot outpace the relevance of NAC solutions. NAC solutions address:

CIS Control 1: Inventory of Authorized and Unauthorized Devices

How NAC Helps :

NAC solutions can see all the hardware devices on the network, allowing for total inventory and control.

CIS Control 2: Inventory of Authorized and Unauthorized Software

How NAC Helps :

NAC solutions gather information on the software installed on endpoints.

CIS Control 3: Secure Configurations for Hardware and Software

How NAC Helps :

NAC solutions can inspect configurations on any endpoints connected to the network.

CIS Control 4: Continuous Vulnerability Assessment and Remediation

How NAC Helps :

Most NAC solutions allow for continuous compliance validations and remediation measures for connected devices.

CIS Control 5: Controlled Use of Administrative Privileges

How NAC Helps :

Role-based access control makes it possible to control use of administrative privileges based on pre-defined roles.

Network security coverage NAC solutions provide:

Visibility into Network Connections:

See and gain insights into every device connecting to the network, and gain actionable intelligence that can be used to optimize network security policies in consideration of threats.

Controlled Access:

By setting security policies to control access across the network, organizations can keep malicious devices off the network, thereby controlling exposure to cybersecurity threats and digital business risks.

Unified Management:

Simplification of tasks for network and security administrators by providing the ability to both see and control connected devices, set automated controls and remediation procedures.

Internet of Things Security:

Gain control over IoT devices and their level of security when connecting to the network with the help of agentless NAC solutions.

Compliance:

NAC solutions help organizations meet a growing body of compliance standards such as PCI-DDS, SOX, HIPAA, and more. Easily perform auditing checks and compile reports.

Integrations:

NAC solutions can easily integrate with existing architecture and share data with other security vendors such as MDM, IPS, SIEM, and more. Using the alerts from integrated solutions, respond faster and with accuracy to threats or changes in the network status.

NAC-as-a-Service

Network access control. Simplified.

More endpoints. More risk to your network.

The rise of BYOD, mobile workforces and loT has driven an exponential increase in the number and types of devices that can connect to today’s corporate networks. With more endpoints than ever before, all of your access layers including wired, wireless and VPN – have never been more vulnerable.

Today, effective network access control requires total device visibility, continuous risk monitoring, and flexible access controls.

Network access control. Delivered in the cloud.

With Portnox CLEAR – the first and only cloud-delivered NAC-as-a Service – organizations gain actionable network visibility and continuous risk monitoring of all endpoints across all access layers – no matter device type or geo-location.

Visibility

Portnox CLEAR determines device type, location and level of access for every user on the network. Additionally, the platform can identify operating systems, installed applications, services, certificates and more helping your IT team ensure compliance across the entire workforce.

Control

With access control based on 802.1X protocol, network administrators can block rogue devices, quarantine non compliant endpoints, limit access to specified resources and more – whatever your internal policy calls for.

Simplicity

As a cloud-delivered solution, Portnox CLEAR is simple to configure, deploy and maintain. With built-in integrations to AzureAD, Okta, Microsoft Intune, Palo Alto Networks and more, you can easily mesh your network access control with your existing tech stack and remain as streamlined as ever.

Security

Portnox is SOC-certified, GDPR ready, and can help organizations in preparation for regulatory compliance, such as PCI, HIPAA and more. All customer data is encrypted in-motion or at rest, user credentials never leave the organization, and administrators can be set to use MFA.

Simple & secure.

Cost
Efficient

Flexible, pay-as-you-go subscription options allow you to scale your business as needed.

Rapid
Deployment

No need to worry about pre-set infrastructure or lengthy training.

Seamless Authentication

Integrate with your directory (Okta, Azure AD, etc.). Includes built-in Certificate Authority, or works with your own.

Device Visibility & Accountability

See all devices on your network – no matter type or location.

Zero-Touch Management

With a cloud-based RADIUS server & no on-premise hardware of software, say goodbye to on-going maintenance.

Flexible Access Controls

Use device posture assessment to drive your policy with Dynamic VLAN or ACL assignments.

No Vendor
Lock-In

Portnox works with any wireless infrastructure.

Plug & Play Integrations

Enjoy built-in connectors to common directories, like AzureAD, Okta, GSuite & more.

How it works.

A closer look at Portnox’s NAC-as-a-Service architecture.

NAC-as-a-Service

Network access control. Simplified.

More endpoints. More risk to your network.

The rise of BYOD, mobile workforces and loT has driven an exponential increase in the number and types of devices that can connect to today’s corporate networks. With more endpoints than ever before, all of your access layers including wired, wireless and VPN – have never been more vulnerable.

Today, effective network access control requires total device visibility, continuous risk monitoring, and flexible access controls.

Network access control. Delivered in the cloud.

With Portnox CLEAR – the first and only cloud-delivered NAC-as-a Service – organizations gain actionable network visibility and continuous risk monitoring of all endpoints across all access layers – no matter device type or geo-location.

Visibility

Portnox CLEAR determines device type, location and level of access for every user on the network. Additionally, the platform can identify operating systems, installed applications, services, certificates and more helping your IT team ensure compliance across the entire workforce.

Control

With access control based on 802.1X protocol, network administrators can block rogue devices, quarantine non compliant endpoints, limit access to specified resources and more – whatever your internal policy calls for.

Simplicity

As a cloud-delivered solution, Portnox CLEAR is simple to configure, deploy and maintain. With built-in integrations to AzureAD, Okta, Microsoft Intune, Palo Alto Networks and more, you can easily mesh your network access control with your existing tech stack and remain as streamlined as ever.

Security

Portnox is SOC-certified, GDPR ready, and can help organizations in preparation for regulatory compliance, such as PCI, HIPAA and more. All customer data is encrypted in-motion or at rest, user credentials never leave the organization, and administrators can be set to use MFA.

Simple & secure.

Cost
Efficient

Flexible, pay-as-you-go subscription options allow you to scale your business as needed.

Rapid
Deployment

No need to worry about pre-set infrastructure or lengthy training.

Seamless Authentication

Integrate with your directory (Okta, Azure AD, etc.). Includes built-in Certificate Authority, or works with your own.

Device Visibility & Accountability

See all devices on your network – no matter type or location.

Zero-Touch Management

With a cloud-based RADIUS server & no on-premise hardware of software, say goodbye to on-going maintenance.

Flexible Access Controls

Use device posture assessment to drive your policy with Dynamic VLAN or ACL assignments.

No Vendor
Lock-In

Portnox works with any wireless infrastructure.

Plug & Play Integrations

Enjoy built-in connectors to common directories, like AzureAD, Okta, GSuite & more.

How it works.

A closer look at Portnox’s NAC-as-a-Service architecture.

Portnox CORE

On-Premise

See, control, and manage the security risks your network faces in real time, all the time with a Next-Gen Network Visibility and Access Management that handles any user, any device, anywhere.

Portnox CORE provides 100% actionable visibility of all devices that are connected to your network. As the first software-based Network Access Management (NAM) platform, Portnox CORE patented solution allows you to manage the security and compliance challenges organizations face in a smart and simple way.

With Portnox CORE, nothing can hide. Utilizing an agentless technology that allows you to detect and profile devices in real time on your wired, wireless, VPN, and virtual networks, Portnox CORE provides an additional layer of device visibility and offers full capabilities for device discovery, authentication, and compliance enforcement. It provides a cutting-edge approach to network security that allows you to:

See – Detects and profiles any device (including loT) on the corporate network, using agentless technology – in real time, and across all network layers

Control – Mitigates risk by actively limiting access, quarantining, or blocking a device and takes steps to minimize security issues by, for example, installing a missing patch

Automate – Delivers automatic reactions, enabling CISOs to reduce the time and cost associated with manual responses

Identify Masquerading Devices and Block Them

Portnox CORE starts at the infrastructure layer, connecting directly to your wired, wireless, and virtual infrastructure. It delivers continuous, event-driven information about all devices connecting to your network. After initial device connection, configuration options support continuous validation of previously validated devices – ensuring they maintain compliance while connected to the network, and reacting to changes automatically.

While most traditional Network Access Management solutions do not have the level of device awareness or enforcement flexibility required for companies to trust moving to full enforcement, with Portnox CORE over 80% of customers who deploy choose to have full enforcement enabled. Portnox CORE provides flexible enforcement actions based on device, user, location, authentication, and compliance. Furthermore, with Portnox CORE you can easily phase in the enforcement process to assure success – starting in monitor/discovery mode, and slowly rolling out automated enforcement to specific ports, switches, VLANS, or locations. Portnox CORE’s architecture offers the following advantages:

  • Natively connects to network infrastructure elements
  • No agents to deploy
  • No reliance on the complexity of 802.1X
  • Real-time, event-driven device awareness
  • Software-based, with no appliances
  • Options for central or distributed deployment

Get to the CORE of Your Network’s Security

Portnox CORE deploys on Windows 2008/2012 R2 servers (physical or virtual). It deploys at a single location, providing you with comprehensive NAM across the entire enterprise. For environments that require a distributed deployment, Portnox supports this at no additional cost.

Unlike many traditional NAM platforms that rely on port mirroring, IP range scans, inventory directory or other passive methods to gain device visibility that are not happening in real time, Portnox directly connects via native protocols to your network infrastructure including switches, WLC, VPN, and virtual. It provides real-time, immediate awareness of network changes. Portnox CORE ensures the security of your network with:

  • Vendor agnostic solution 
  • Agentless architecture
  • Does not rely on 802.1X
  • Incident response capabilities
  • Software-based
  • Multi-factor verification

FEATURES AND BENEFITS

Portnox CORE saves you time and money with an intuitive interface and comprehensive control of every device connecting to your network. With Portnox CORE, you have the knowledge you need to know your network secure.

  • 100% actionable visibility
  • Protection from vulnerabilities that result from Mobile, BYOD, and loT
  • Ease of deployment, requiring no prior training
  • Software-based and fully scalable, requiring no hardware
  • Cost-effective and affordable for businesses of all sizes
  • Protection of all access layers, including wireless, VPN, wired, virtual, and cloud
  • Multi-factor authentication over the VPN, based on user identity and device risk score
  • Continuous risk monitoring that identifies and reacts to rogue or risky endpoints
  • Centralized security for all locations

Product Comparison

A look at Portnox’s network access control (NAC) solutions.

Portnox CLEAR

Cloud-Delivered NAC

Portnox CLEAR NAC-as-a-Service provides actionable network visibility and continuous risk monitoring of all endpoints across all access layers- no matter device or location.

Key Elements:

  • Cloud-delivered, no on-site infrastructure
  • Runs on Microsoft Azure
  • SaaS subscription model
  • Covers wired, WiFi and remote access environments
  • Covers managed devices, BYOD and loT
  • 802.1X reliant
  • Agent optional

Portnox CORE

On-Premise NAC

Portnox CORE delivers an easy-to-use, on premise network access control solution focused on ensuring fast deployment, robust security, limited maintenance & more.

Key Elements:

  • Software-based, no appliances
  • Runs on Windows servers
  • Perpetual licenscing and subscription models
  • Covers wired, WiFi and remote access environments
  • Covers managed devices, BYOD and loT
  • 802.1X not required
  • No agent

日期

標題

REvil ransomware attack illustrates IT systems need for epidemiological investigation

To fight ransomware hacks drain the cryptocurrency swamp

What Credit Unions Need to Know About the NCUA ACET & its New Cybersecurity Standards

Prominent U.S. University Overcomes Network Access Challenges with Cloud NAC

Portnox Named Winner of the Coveted Global InfoSec Awards during RSA Conference 2021

Portnox CLEAR vs. On-Premise NAC: A Look at Total Cost of Ownership (TCO)

Major Events Venue Moves from On-Prem to Cloud NAC as Part of Digital Transformation

The Future of Network Security: Identity, Segmentation & Securing the Edge

Healthcare Provider Moves from Aruba ClearPass to Portnox CLEAR

Portnox Aids Credit Unions in Meeting New NCUA ACET Compliance Standards for Cybersecurity

Go hack yourself: How to thwart network hacks by cybercriminals, like Iran’s state-sponsored Pay2Key attacks

The 5 Key Values of Portnox CLEAR

Portnox Achieves a Microsoft Gold Cloud Platform Competency

WEBINAR: Network Access Control: A Must-Have in the Cybersecurity Arsenal

RADIUS Change of Authorization (CoA): What Is It? Why Use It?

Segmenting Your Network with Dynamic VLAN Assignment

WEBINAR: How Credit Unions Can Ensure Secure Remote Network Access

Five Ways to Master Remote Access Security

Monitoring 802.1X EAP: What You Need to Know

Why It’s Important to Control What’s on Your Wireless Network at All Times

What is 802.1X Extensible Authentication Protocol (EAP)?

Portnox Partners with Distology for Sole Distribution of Cloud-Delivered Network Access Control (NAC) Solution in United Kingdom & Ireland

(65) 6296 4268

E-mailsales@version-2.com.sg
Fax:(65) 6296 4252 / (65) 6296 4269

(65) 6296 4268

   E-mail:sales@version-2.com.sg
   Fax:(65) 6296 4252 / (65) 6296 4269

(65) 6296 4268

E-mail:sales@version-2.com.sg
Fax:(65) 6296 4252 / (65) 6296 4269