NAC - 100% control
The NAC (Network Access Control) system allows to manage the access of users and their devices to the corporate network. Precisely, it is the possibility of detailed control over this:
- WHO? Who can access the network?
- WHAT? What device it can connect to?
- HOW? On what network devices?
- WHEN AND WHERE? On what conditions?
VIEW - 100% visibility
NACVIEW provides network visibility to see everything connected to the network in real-time. The system can download data about end devices from external databases such as Active Directory, SQL databases, LDAP or Radius servers. Using SNMP protocols, you can turn on monitoring, which allows you to view the operation of devices and their load.
A standard that provides recommendations for authenticating devices on a network. Currently, it is recognized by specialists as the most effective method of preventing unauthorized access, which significantly increases the security of the entire network.
A technology that allows you to create multiple virtual networks on one physical network. It is a logical grouping of devices and users, e.g. based on department or job title. These groups can be created regardless of where the users are physically located.
The web page for authorizing users who send a request for access to the network. Thanks to this, they will be connected to the Internet, being able to use only the resources specified by the administrator. NACVIEW gives you two possibilities: configure an external Captive Portal or implement the Captive Portal of the NACVIEW system.
Automated and transparent visualization of device connections in the network. It provides a graphical representation of the network that allows to see which devices are connected and which are not. This allows to quickly detect network anomalies and react to them accordingly.
IP addressing management, thanks to which you can check the use of IP addresses as well as verify who or what device connects to a given address. This allows, among other things, to detect and prevent network collisions.
A feature that can detect incompatible, unknown or misconfigured devices. It allows you to quickly find invalid network traffic (e.g. MAC / IP address cloning, port scanning, invalid gateway) and quarantine the infected device.
A feature that enables two-way information exchange between NACVIEW and other cybersecurity solutions. It increases the level of security by automatically responding to threats, e.g. disconnecting the device when malware is detected on it. Most often, integration concerns systems such as Firewall, UTM, MDM, SIEM, etc.
Identification of devices connected to the network and their classification by device type (e.g. computer, telephone, printer, camera, etc.), type of operating system and manufacturer. Profiling uses many available methods, including: DHCP Fingerprinting, HTTP / S, NMAP, DNS, RADIUS.
BYOD and guest access
A solution that allows us to securely grant external users (guests) access to the network and register private devices of employees in the corporate network. Guest access can be allocated through fixed-term accounts or a dedicated portal.