SYSTEM FOR MANAGING THE ACCESS OF USERS AND DEVICES TO THE NETWORK.

NACVIEW SYSTEM

allows to control end devices and identities that try to access the network - both wired and wireless networks, including VPN. Thanks to a combination of “NAC” and “VIEW” which gives full control and visibility, NACVIEW is essential for the correct and complete protection of the company network environment.



Solutions

NAC - 100% control


The NAC (Network Access Control) system allows to manage the access of users and their devices to the corporate network. Precisely, it is the possibility of detailed control over this:


  • WHO? Who can access the network?
  • WHAT? What device it can connect to?
  • HOW? On what network devices?
  • WHEN AND WHERE? On what conditions?

VIEW - 100% visibility


NACVIEW provides network visibility to see everything connected to the network in real-time. The system can download data about end devices from external databases such as Active Directory, SQL databases, LDAP or Radius servers. Using SNMP protocols, you can turn on monitoring, which allows you to view the operation of devices and their load.




802.1X

A standard that provides recommendations for authenticating devices on a network. Currently, it is recognized by specialists as the most effective method of preventing unauthorized access, which significantly increases the security of the entire network.

VLAN

A technology that allows you to create multiple virtual networks on one physical network. It is a logical grouping of devices and users, e.g. based on department or job title. These groups can be created regardless of where the users are physically located.

Captive Portal

The web page for authorizing users who send a request for access to the network. Thanks to this, they will be connected to the Internet, being able to use only the resources specified by the administrator. NACVIEW gives you two possibilities: configure an external Captive Portal or implement the Captive Portal of the NACVIEW system.

Connection map

Automated and transparent visualization of device connections in the network. It provides a graphical representation of the network that allows to see which devices are connected and which are not. This allows to quickly detect network anomalies and react to them accordingly.

IPAM

IP addressing management, thanks to which you can check the use of IP addresses as well as verify who or what device connects to a given address. This allows, among other things, to detect and prevent network collisions.

Threat detection

A feature that can detect incompatible, unknown or misconfigured devices. It allows you to quickly find invalid network traffic (e.g. MAC / IP address cloning, port scanning, invalid gateway) and quarantine the infected device.

Solution integration

A feature that enables two-way information exchange between NACVIEW and other cybersecurity solutions. It increases the level of security by automatically responding to threats, e.g. disconnecting the device when malware is detected on it. Most often, integration concerns systems such as Firewall, UTM, MDM, SIEM, etc.

Profiling

Identification of devices connected to the network and their classification by device type (e.g. computer, telephone, printer, camera, etc.), type of operating system and manufacturer. Profiling uses many available methods, including: DHCP Fingerprinting, HTTP / S, NMAP, DNS, RADIUS.

BYOD and guest access

A solution that allows us to securely grant external users (guests) access to the network and register private devices of employees in the corporate network. Guest access can be allocated through fixed-term accounts or a dedicated portal.

Read more

The role of NAC systems in overall network security and why are they needed now as never before?

Read more

NACVIEW Scout

Collect data about endpoints with NACVIEW Scout. The program retrieves information about the device and shows its security status. Integrated with the NACVIEW system, it allows you to control the access of devices depending on having an up-to-date antivirus program or other elements essential for network security.

Read more

NACVIEW Assistant

Give users the ability to automatic configuration the network on the device. NACVIEW Assistant is an automated network configurator adapted to the device's operating system. Thanks to this, you will save time on manual network configuration for devices of individual users.

Read more

NACVIEW Authenticator

Ensure that your network is appropriately protected by two-factor authentication. The NACVIEW Authenticator is installed on the user's device to generate a unique code for it, allowing for additional verification. Thanks to this, you can be sure that the network will not be accessed by unwanted users who are a potential threat to the security of the entire network and the company.

Read more