The Importance of a Network Access Control Solution

The enterprise computing landscape has shifted significantly since network access control (NAC) solutions were first introduced. Originally created to control access for devices connecting over the wired network, NAC is effective at knowing when devices connect, and controlling their access based on pre-defined security policies. Rapid innovation in the wireless network over the past decade, together with mobile device technology and Internet of Things, has made it so that the enterprise hardly depends on wired-only systems to achieve its business bottom line, causing the capabilities of NAC solutions to evolve.

Evidenced in the fact that NAC solutions address the Top Five Center for Internet Security (CIS) Controls, it seems that the rapid pace of technological innovation cannot outpace the relevance of NAC solutions. NAC solutions address:

CIS Control 1: Inventory of Authorized and Unauthorized Devices

How NAC Helps :

NAC solutions can see all the hardware devices on the network, allowing for total inventory and control.

CIS Control 2: Inventory of Authorized and Unauthorized Software

How NAC Helps :

NAC solutions gather information on the software installed on endpoints.

CIS Control 3: Secure Configurations for Hardware and Software

How NAC Helps :

NAC solutions can inspect configurations on any endpoints connected to the network.

CIS Control 4: Continuous Vulnerability Assessment and Remediation

How NAC Helps :

Most NAC solutions allow for continuous compliance validations and remediation measures for connected devices.

CIS Control 5: Controlled Use of Administrative Privileges

How NAC Helps :

Role-based access control makes it possible to control use of administrative privileges based on pre-defined roles.

Network security coverage NAC solutions provide:

Visibility into Network Connections:

See and gain insights into every device connecting to the network, and gain actionable intelligence that can be used to optimize network security policies in consideration of threats.

Controlled Access:

By setting security policies to control access across the network, organizations can keep malicious devices off the network, thereby controlling exposure to cybersecurity threats and digital business risks.

Unified Management:

Simplification of tasks for network and security administrators by providing the ability to both see and control connected devices, set automated controls and remediation procedures.

Internet of Things Security:

Gain control over IoT devices and their level of security when connecting to the network with the help of agentless NAC solutions.

Compliance:

NAC solutions help organizations meet a growing body of compliance standards such as PCI-DDS, SOX, HIPAA, and more. Easily perform auditing checks and compile reports.

Integrations:

NAC solutions can easily integrate with existing architecture and share data with other security vendors such as MDM, IPS, SIEM, and more. Using the alerts from integrated solutions, respond faster and with accuracy to threats or changes in the network status.

網絡訪問控制,即時提升。

Portnox 平台是一種軟件解決方案,可遍及所有網絡層 – 以太網、無線、虛擬、VPN 和雲端。

The Importance of a Network Access Control Solution

The enterprise computing landscape has shifted significantly since network access control (NAC) solutions were first introduced. Originally created to control access for devices connecting over the wired network, NAC is effective at knowing when devices connect, and controlling their access based on pre-defined security policies. Rapid innovation in the wireless network over the past decade, together with mobile device technology and Internet of Things, has made it so that the enterprise hardly depends on wired-only systems to achieve its business bottom line, causing the capabilities of NAC solutions to evolve.

Evidenced in the fact that NAC solutions address the Top Five Center for Internet Security (CIS) Controls, it seems that the rapid pace of technological innovation cannot outpace the relevance of NAC solutions. NAC solutions address:

CIS Control 1: Inventory of Authorized and Unauthorized Devices

How NAC Helps :

NAC solutions can see all the hardware devices on the network, allowing for total inventory and control.

CIS Control 2: Inventory of Authorized and Unauthorized Software

How NAC Helps :

NAC solutions gather information on the software installed on endpoints.

CIS Control 3: Secure Configurations for Hardware and Software

How NAC Helps :

NAC solutions can inspect configurations on any endpoints connected to the network.

CIS Control 4: Continuous Vulnerability Assessment and Remediation

How NAC Helps :

Most NAC solutions allow for continuous compliance validations and remediation measures for connected devices.

CIS Control 5: Controlled Use of Administrative Privileges

How NAC Helps :

Role-based access control makes it possible to control use of administrative privileges based on pre-defined roles.

Network security coverage NAC solutions provide:

Visibility into Network Connections:

See and gain insights into every device connecting to the network, and gain actionable intelligence that can be used to optimize network security policies in consideration of threats.

Controlled Access:

By setting security policies to control access across the network, organizations can keep malicious devices off the network, thereby controlling exposure to cybersecurity threats and digital business risks.

Unified Management:

Simplification of tasks for network and security administrators by providing the ability to both see and control connected devices, set automated controls and remediation procedures.

Internet of Things Security:

Gain control over IoT devices and their level of security when connecting to the network with the help of agentless NAC solutions.

Compliance:

NAC solutions help organizations meet a growing body of compliance standards such as PCI-DDS, SOX, HIPAA, and more. Easily perform auditing checks and compile reports.

Integrations:

NAC solutions can easily integrate with existing architecture and share data with other security vendors such as MDM, IPS, SIEM, and more. Using the alerts from integrated solutions, respond faster and with accuracy to threats or changes in the network status.

NAC-as-a-Service

Network access control. Simplified.

More endpoints. More risk to your network.

The rise of BYOD, mobile workforces and loT has driven an exponential increase in the number and types of devices that can connect to today’s corporate networks. With more endpoints than ever before, all of your access layers including wired, wireless and VPN – have never been more vulnerable.

Today, effective network access control requires total device visibility, continuous risk monitoring, and flexible access controls.

Network access control. Delivered in the cloud.

With Portnox CLEAR – the first and only cloud-delivered NAC-as-a Service – organizations gain actionable network visibility and continuous risk monitoring of all endpoints across all access layers – no matter device type or geo-location.

Visibility

Portnox CLEAR determines device type, location and level of access for every user on the network. Additionally, the platform can identify operating systems, installed applications, services, certificates and more helping your IT team ensure compliance across the entire workforce.

Control

With access control based on 802.1X protocol, network administrators can block rogue devices, quarantine non compliant endpoints, limit access to specified resources and more – whatever your internal policy calls for.

Simplicity

As a cloud-delivered solution, Portnox CLEAR is simple to configure, deploy and maintain. With built-in integrations to AzureAD, Okta, Microsoft Intune, Palo Alto Networks and more, you can easily mesh your network access control with your existing tech stack and remain as streamlined as ever.

Security

Portnox is SOC-certified, GDPR ready, and can help organizations in preparation for regulatory compliance, such as PCI, HIPAA and more. All customer data is encrypted in-motion or at rest, user credentials never leave the organization, and administrators can be set to use MFA.

Simple & secure.

Cost
Efficient

Flexible, pay-as-you-go subscription options allow you to scale your business as needed.

Rapid
Deployment

No need to worry about pre-set infrastructure or lengthy training.

Seamless Authentication

Integrate with your directory (Okta, Azure AD, etc.). Includes built-in Certificate Authority, or works with your own.

Device Visibility & Accountability

See all devices on your network – no matter type or location.

Zero-Touch Management

With a cloud-based RADIUS server & no on-premise hardware of software, say goodbye to on-going maintenance.

Flexible Access Controls

Use device posture assessment to drive your policy with Dynamic VLAN or ACL assignments.

No Vendor
Lock-In

Portnox works with any wireless infrastructure.

Plug & Play Integrations

Enjoy built-in connectors to common directories, like AzureAD, Okta, GSuite & more.

How it works.

A closer look at Portnox’s NAC-as-a-Service architecture.

Cloud-Delivered Network Visibility & Control Solutions

Portnox CLEAR provides actionable network visibility, continuous risk monitoring, and proactive remediation of all endpoints across all access layers – no matter device or location.

NAC-as-a-Service

Leverage our cloud-delivered NAC solution to enable device authentication, elevate network visibility, strengthen access control, and implement endpoint risk monitoring across all access layers.

Zero-Trust Remote Access-as-a-Service

Easily enhance your remote access security for VPN, VDI and enterprise cloud applications with continuous endpoint risk monitoring, proactive device remediation and MFA.

WiFi Security-as-a-Service

Move away from PSKs and seamlessly secure WiFi access in the cloud no matter location or device type through the use of identity-based authentication that leverages personal credentials or digital certificates.

RADIUS-as-a-Service

Tired of all the heavy lifting when it comes to standing up RADIUS servers? We feel your pain, that’s why we’re making it easier than ever to securely authenticate and control wired and wireless network access.

On-Premise Network Access Control

Portnox CORE delivers an easy-to-use, on-premise network access control solution that focuses on ensuring fast deployment, robust network security, limited maintenance and more.

Simple to Deploy

No network prep work required, no appliance installations or infrastructure changes.

Simple to Operate

Web based, self-explanatory UI, with smart workflows, easy onboarding and automated response actions.

Simple to Maintain

No need to replace appliances when increasing number of devices, cluster and backups done via software, pay for what you need.

Actionable Visibility & Control

Exceptional visibility of VoIP, IoT and BYOD, in-depth device intelligence, full network view, full customization of remediation & action scripts.

Product Comparison

A look at Portnox’s network access control (NAC) solutions.

Portnox CLEAR

Cloud-Delivered NAC

Portnox CLEAR NAC-as-a-Service provides actionable network visibility and continuous risk monitoring of all endpoints across all access layers- no matter device or location.

Key Elements:

  • Cloud-delivered, no on-site infrastructure
  • Runs on Microsoft Azure
  • SaaS subscription model
  • Covers wired, WiFi and remote access environments
  • Covers managed devices, BYOD and loT
  • 802.1X reliant
  • Agent optional

Portnox CORE

On-Premise NAC

Portnox CORE delivers an easy-to-use, on premise network access control solution focused on ensuring fast deployment, robust security, limited maintenance & more.

Key Elements:

  • Software-based, no appliances
  • Runs on Windows servers
  • Perpetual licenscing and subscription models
  • Covers wired, WiFi and remote access environments
  • Covers managed devices, BYOD and loT
  • 802.1X not required
  • No agent

日期

標題

物聯網分析、可見性和分類,由 Portnox CLEAR 提供支持

Gartner 評論 2021 年的 NAC 工具

回到網絡保護的基礎

安全訪問服務邊緣是網絡安全的未來嗎?

食品公司用 Portnox NAC 取代 Cisco ISE

客廳網絡攻擊已成為新常態

冠狀病毒和雲——黑客的雙贏組合

REvil 勒索軟件攻擊說明 IT 系統需要進行流行病學調查

為了打擊勒索軟件黑客,耗盡了加密貨幣沼澤

信用合作社需要了解的有關 NCUA ACET 及其新網絡安全標準的信息

美國著名大學利用 Cloud NAC 克服網絡訪問挑戰

Portnox在2021年RSA大會上被提名為令人垂涎的全球InfoSec獎的獲勝者

Portnox CLEAR與本地NAC:總擁有成本(TCO)

作為數字轉型的一部分,大型活動場地從本地遷移到雲NAC

網絡安全的未來:身份,分段和邊緣保護

醫療保健提供商從Aruba ClearPass轉移到Portnox CLEAR

自行入侵:如何阻止網絡犯罪分子對網絡黑客的攻擊,例如伊朗政府資助的Pay2Key攻擊

企業 WiFi 身份驗證,解釋

SASE 與網絡訪問控制的未來

我們的城堡沒有圍牆! 萬籟俱寂,零信任

Portnox 獲得 Microsoft 金牌雲平台能力

Portnox CLEAR 的 5 個關鍵價值

網絡研討會:網絡訪問控制:網絡安全工具庫中的必備功能

與我們的銷售團隊聯絡

與我們的銷售團隊聯絡

(02) 7722-6899

    電郵:sales@version-2.com.tw
    傳真:(02) 7722-6889

與我們的
銷售團隊聯絡

(02) 7722-6899
    電郵:sales@version-2.com.tw
    傳真:(02) 7722-6889

(02) 7722-6899

    電郵:sales@version-2.com.tw
    傳真:(02) 7722-6889