NETWORK ACCESS CONTROL

Network Access Control (NAC) is a type of Cyber Security technology that allows an organization to define and implement policies that control the access of endpoints to a network; while at the same time providing visibility of each device trying to access. NAC provides security posture assessments for the endpoints, highlighting the risks, and can control access based on the level of risk tolerated by the organization.

Portnox Network Access Control (NAC) is a light-weight solution delivered from the cloud (as-a-service) or from an on-premises centralized software, providing agentless visibility into every endpoint ON or OFF the enterprise premises, whether it is IoT, BYOD or a company managed device.

Request a Demo
What is
NAC
Used for?

NAC has evolved to provide more than access control for the enterprise network. NAC solutions now play an important role in a broad array of cyber security use-cases, to provide full network visibility, endpoint discovery, simplified onboarding, security profiling, compliance enforcement, response and remediation methods; across your cloud, VPN, wired and wireless networks.

NAC USE CASES

  • Visibility & Security Profiling
    • Identify all devices on the network and map out their properties such as OS, applications and services.
    • Analyze endpoint configuration and provide a risk score for each endpoint in order to track the organizational Cyber Hygiene.
    • Remediate issues by restarting a service, updating software or placing risky endpoints in quarantine.
  • Simplified Onboarding to Ensure Productivity

    Connect guests, contractors, BYOD and company owned endpoints to the network in a secure and hassle-free method, to ensure the growth of the organization’s productivity.

  • WiFi Security

    Instead of using a shared password (PSK), that is known to all, use personal identities to authenticate devices and users to your WiFi network.
    Identities include cloud services such as Azure AD (office 365) or G-Suite, on-prem services such as Active Directory / Open LDAP and digital certificate

Visibility & Security Profiling
  • Identify all devices on the network and map out their properties such as OS, applications and services.
  • Analyze endpoint configuration and provide a risk score for each endpoint in order to track the organizational Cyber Hygiene.
  • Remediate issues by restarting a service, updating software or placing risky endpoints in quarantine.
Simplified Onboarding to Ensure Productivity

Connect guests, contractors, BYOD and company owned endpoints to the network in a secure and hassle-free method, to ensure the growth of the organization’s productivity.

WiFi Security

Instead of using a shared password (PSK), that is known to all, use personal identities to authenticate devices and users to your WiFi network.
Identities include cloud services such as Azure AD (office 365) or G-Suite, on-prem services such as Active Directory / Open LDAP and digital certificate

WHAT TO LOOK FOR IN A NAC SOLUTION...

Agentless network access control
Vendor agnostic – support any switch / wireless components
SaaS or on-premises centralized software (no hardware)
100% visibility of IoT, BYOD and managed endpoints
Continuous risk management ON & OFF premises
Support for fail open – network availability

BOOST YOUR NAC KNOWLEDGE

LEVEL I
NEW TO NAC

White Paper & Infographic:
The importance of NAC

Articles: Network Access Control – Birds Eye View – Part 1 & Part 2

VIDEO: How to discover and control a vulnerable device

LEVEL II
FAMILIAR WITH NAC

Article: What Kind of WiFi Protected Access Should You Use to Secure Your Enterprise?

Article: resurrection of NAC

VIDEO: How to Configure Enterprise-Grade WiFi Security in 2 minutes

LEVEL III
Advanced NAC Practitioner

eBook: NAC as-a-service

Webinar: How to use cloud-delivered/SaaS NAC to protect Your Network.

Research Paper: Global
Firm Frost & Sullivan explains why Portnox is the market leader for midsize to large organizations.

Find out how this infamous network breach that could have been prevented through the use of a effective network access control...
A rogue device helped hackers access NASA JPL systems: JPL might have the technology to make Martian rovers, but it's seriously lacking in cybersecurity measures

PORTNOX AWARDS

SUCCESS STORIES

“Portnox was easy to implement, priced competitively and the right solution for us.”

Luval Kat
CISO, eToro

“Deploying Portnox CORE, we were able to not only achieve compliance with several major PCI-DSS standards, but also gain control over which devices and users access our network. The agentless technology and simple deployment made integrating Portnox’s solution into our business a no brainer.”

Wimpie Garbers,
IT Manager, NAMCLEAR

“We selected Portnox…to allow for seamless access…while ensuring we have the proper security in place to block potential hacks or unauthorized users.”

Sean Reddington,
IT Director & CISO, OrthoIndy

OUR CUSTOMERS

Over 500 customers worldwide