Network Access Control Executive Summary

download Network Access Control Executive Summary

of 4

Transcript of Network Access Control Executive Summary

  • 7/29/2019 Network Access Control Executive Summary

    1/4Copyright 2013, NetClarity, Inc. All rights reserved worldwide. NACwall, Inside-Out Network Security are NetClarity tradema

    Network Access Control

    Within minutes of set up, you can solve the

    dilemma by automatically blocking any device from

    entering your network.

    www.netclarity.net

    NetClaritys NAC solutions are sized for network and help yousolve the growing (BYOD) trend.

    http://www.netclarity.net/http://www.netclarity.net/http://www.netclarity.net/
  • 7/29/2019 Network Access Control Executive Summary

    2/4Copyright 2013, NetClarity, Inc. All rights reserved worldwide. NACwall, Inside-Out Network Security are NetClarity tradema

    Over 80% of all successful network security attacks originate behind th

    firewall. This continues to be fueled by a trend of employee-owned dev

    es in the workplace, which are inherently more difficult to manage, and

    more susceptible to malware.

    Heres how BYOD can pose a problem:

    Administrators lack the tools needed to give them both visibility an

    control over all assets accessing their network.

    Some have Mobile Device Management (MDM) or other endpoint

    software on those endpoints that support it and have it installed.

    This is helpful, but incomplete.

    NetClarity provides agentless discovery and control of the remainder as

    well as all internal network assets through a protocol manipulation tech

    nology by simply attaching it to a network.

    The set-it-and-forget- it mindset that applied to firewalls and wireless

    security perimeters in the past is relatively ineffective in a BYOD work-

    place. Here, the security threats are far more dynamic, with employees

    inadvertently downloading malware by night and walking right past the

    firewall the next morning into the office and connecting to the secure

    wireless networks. Antivirus solutions, where installed, can help to mit

    gate this risk through continual monitoring, but are only partially effec-

    tive and not supported universally.

    NetClarity minimizes this risk by controlling access to all internal netwo

    devices and by assessing the health of these devices via its vulnerabili

    and malware detection engines.

    The need for a convenient access control solution for the BYOD workplac

    Copyright 2013, NetClarity, Inc. All rights reserved worldwide. NACwall, Inside-Out Network Security are NetClarity tradema

    Access control solutions have historically been a nightmare to

    deploy, because they have depended upon one of the following

    actions:

    : Re-architecting the network by placing the

    access control solution in-line with all network traffic, which

    administrators hesitate to do because of the potential of

    catastrophic downtime and the introduction of a new choke

    point into the network;

    : Extensive integration with existing net-

    work infrastructure equipment like switches, RADIUS servers,

    and firewalls, which is time-consuming and likely not to work

    with all equipment in heterogeneous networks;

    : Using credentialed access to end-

    points or agents to be installed on endpoints, which means

    that only certain endpoints can be supported (e.g., windows

    devices, etc.), and this is also time consuming.

    These options strain IT resources and budgets todayparticularly

    in the midmarket, and are therefore impractical for effective man-

    agement of BYOD. Here the solution must be both universally

    applicable to all devices on the network, as well as seamless to

    deploy and manage. NetClarity solves all of the above actions by

    meeting the following requirements:

    A plug-n-play solution like NetClarity provides relief to both the

    implementation pain-point and the incomplete coverage pain-

    point through a fourth option: intelligent protocol manipulation.

  • 7/29/2019 Network Access Control Executive Summary

    3/4Copyright 2013, NetClarity, Inc. All rights reserved worldwide. NACwall, Inside-Out Network Security are NetClarity tradema

    True agentless discovery and blocking

    NetClaritys philosophy is that in order for security to be prac-

    ticed, it must first be practical. By merely attaching the NetClarity

    appliance to the network requiring protection, you can immedi-

    ately discover all internal network assets and block untrusted

    devices at will. NetClarity is the only access control vendor that

    can accomplish this because our blocking technology is based

    on protocol manipulation, which means that it is universally ap-

    plicable and independent from agents, credentials, network in-

    frastructure equipment, OS or device type. It is both agentless

    and integrationless.

    Access control made simple with NetClarity

    How NetClarity works in your network

    Copyright 2013, NetClarity, Inc. All rights reserved worldwide. NACwall, Inside-Out Network Security are NetClarity tradema

    RISKprofiler allows you to see a snapshot of your

    network and the threats, vulnerabilities, and asset

    risk levels.

    The Manage Assets screen allows you to trust and untrus

    assets that are trying to gain access onto your network.

    The Command Center comes with all Enterprise

    appliances and allows you to manage branch or

    remote locations efficiently.

    Manage assets efficiently

    NetClaritys proprietary blocking technology enables it to

    immediately block untrusted devices without dependence

    upon any integration with network infrastructure or

    agents. Detection and blocking are immediate.

  • 7/29/2019 Network Access Control Executive Summary

    4/4

    NetClaritys solutions scale to fit your network topology

    Copyright 2013, NetClarity, Inc. All rights reserved worldwide. NACwall, Inside-Out Network Security are NetClarity tradema

    NANO 25 and 100 Branch Pro Enterprise 10 Enterprise 100 Enterprise 250

    Setup Time15 minutes 30 minutes under an hour 1-2 hours 2-4 hours

    Protected Nodes25/100 500 1000 1500 2000

    802.1q Tagged VLANs10 VLANs 20 VLANs 40 VLANs 60 VLANs 80 VLANs

    Contact NetClarity:[email protected], Option #2

    Find us online:

    www.netclarity.net

    NetClarity is an emerging leader in access control products and technology be-

    cause of our deployment-in-minutes architecture. We sell our software pre-

    packaged on industry-standard network appliances into a variety of verticals in

    the mid-market segment. Our solutions capitalize on two significant industry

    trends: the exponentially increasing threats to networks from malware, cyber

    criminals in tandem with a rapid increase in the number of employee-owned

    mobile wireless devices in the workplace (BYOD); and the need to demonstrate

    that networks are in compliance with regulatory agencies.

    NetClarity sells its products and services through channel partners worldwide.

    About NetClarity

    : Scalable to fit within any budget and network topology no

    forklift upgrades. Keep what you have.

    The Nano appliances fit perfectly into branch or remote

    locations and protects up to 100 assets.

    The Branch Pro helps mid-sized businesses protect their

    corporate resources and protects up to 500 assets.

    The Enterprise appliances are great for larger networks with anywhere from 1000 to 2000 protected assets.

    mailto:[email protected]:[email protected]://www.netclarity.net/http://www.netclarity.net/http://www.netclarity.net/http://www.linkedin.com/company/130511?trk=tyahhttp://www.facebook.com/netclarityhttp://www.twitter.com/netclaritymailto:[email protected]