7/29/2019 Network Access Control Executive Summary
1/4Copyright 2013, NetClarity, Inc. All rights reserved worldwide. NACwall, Inside-Out Network Security are NetClarity tradema
Network Access Control
Within minutes of set up, you can solve the
dilemma by automatically blocking any device from
entering your network.
www.netclarity.net
NetClaritys NAC solutions are sized for network and help yousolve the growing (BYOD) trend.
http://www.netclarity.net/http://www.netclarity.net/http://www.netclarity.net/7/29/2019 Network Access Control Executive Summary
2/4Copyright 2013, NetClarity, Inc. All rights reserved worldwide. NACwall, Inside-Out Network Security are NetClarity tradema
Over 80% of all successful network security attacks originate behind th
firewall. This continues to be fueled by a trend of employee-owned dev
es in the workplace, which are inherently more difficult to manage, and
more susceptible to malware.
Heres how BYOD can pose a problem:
Administrators lack the tools needed to give them both visibility an
control over all assets accessing their network.
Some have Mobile Device Management (MDM) or other endpoint
software on those endpoints that support it and have it installed.
This is helpful, but incomplete.
NetClarity provides agentless discovery and control of the remainder as
well as all internal network assets through a protocol manipulation tech
nology by simply attaching it to a network.
The set-it-and-forget- it mindset that applied to firewalls and wireless
security perimeters in the past is relatively ineffective in a BYOD work-
place. Here, the security threats are far more dynamic, with employees
inadvertently downloading malware by night and walking right past the
firewall the next morning into the office and connecting to the secure
wireless networks. Antivirus solutions, where installed, can help to mit
gate this risk through continual monitoring, but are only partially effec-
tive and not supported universally.
NetClarity minimizes this risk by controlling access to all internal netwo
devices and by assessing the health of these devices via its vulnerabili
and malware detection engines.
The need for a convenient access control solution for the BYOD workplac
Copyright 2013, NetClarity, Inc. All rights reserved worldwide. NACwall, Inside-Out Network Security are NetClarity tradema
Access control solutions have historically been a nightmare to
deploy, because they have depended upon one of the following
actions:
: Re-architecting the network by placing the
access control solution in-line with all network traffic, which
administrators hesitate to do because of the potential of
catastrophic downtime and the introduction of a new choke
point into the network;
: Extensive integration with existing net-
work infrastructure equipment like switches, RADIUS servers,
and firewalls, which is time-consuming and likely not to work
with all equipment in heterogeneous networks;
: Using credentialed access to end-
points or agents to be installed on endpoints, which means
that only certain endpoints can be supported (e.g., windows
devices, etc.), and this is also time consuming.
These options strain IT resources and budgets todayparticularly
in the midmarket, and are therefore impractical for effective man-
agement of BYOD. Here the solution must be both universally
applicable to all devices on the network, as well as seamless to
deploy and manage. NetClarity solves all of the above actions by
meeting the following requirements:
A plug-n-play solution like NetClarity provides relief to both the
implementation pain-point and the incomplete coverage pain-
point through a fourth option: intelligent protocol manipulation.
7/29/2019 Network Access Control Executive Summary
3/4Copyright 2013, NetClarity, Inc. All rights reserved worldwide. NACwall, Inside-Out Network Security are NetClarity tradema
True agentless discovery and blocking
NetClaritys philosophy is that in order for security to be prac-
ticed, it must first be practical. By merely attaching the NetClarity
appliance to the network requiring protection, you can immedi-
ately discover all internal network assets and block untrusted
devices at will. NetClarity is the only access control vendor that
can accomplish this because our blocking technology is based
on protocol manipulation, which means that it is universally ap-
plicable and independent from agents, credentials, network in-
frastructure equipment, OS or device type. It is both agentless
and integrationless.
Access control made simple with NetClarity
How NetClarity works in your network
Copyright 2013, NetClarity, Inc. All rights reserved worldwide. NACwall, Inside-Out Network Security are NetClarity tradema
RISKprofiler allows you to see a snapshot of your
network and the threats, vulnerabilities, and asset
risk levels.
The Manage Assets screen allows you to trust and untrus
assets that are trying to gain access onto your network.
The Command Center comes with all Enterprise
appliances and allows you to manage branch or
remote locations efficiently.
Manage assets efficiently
NetClaritys proprietary blocking technology enables it to
immediately block untrusted devices without dependence
upon any integration with network infrastructure or
agents. Detection and blocking are immediate.
7/29/2019 Network Access Control Executive Summary
4/4
NetClaritys solutions scale to fit your network topology
Copyright 2013, NetClarity, Inc. All rights reserved worldwide. NACwall, Inside-Out Network Security are NetClarity tradema
NANO 25 and 100 Branch Pro Enterprise 10 Enterprise 100 Enterprise 250
Setup Time15 minutes 30 minutes under an hour 1-2 hours 2-4 hours
Protected Nodes25/100 500 1000 1500 2000
802.1q Tagged VLANs10 VLANs 20 VLANs 40 VLANs 60 VLANs 80 VLANs
Contact NetClarity:[email protected], Option #2
Find us online:
www.netclarity.net
NetClarity is an emerging leader in access control products and technology be-
cause of our deployment-in-minutes architecture. We sell our software pre-
packaged on industry-standard network appliances into a variety of verticals in
the mid-market segment. Our solutions capitalize on two significant industry
trends: the exponentially increasing threats to networks from malware, cyber
criminals in tandem with a rapid increase in the number of employee-owned
mobile wireless devices in the workplace (BYOD); and the need to demonstrate
that networks are in compliance with regulatory agencies.
NetClarity sells its products and services through channel partners worldwide.
About NetClarity
: Scalable to fit within any budget and network topology no
forklift upgrades. Keep what you have.
The Nano appliances fit perfectly into branch or remote
locations and protects up to 100 assets.
The Branch Pro helps mid-sized businesses protect their
corporate resources and protects up to 500 assets.
The Enterprise appliances are great for larger networks with anywhere from 1000 to 2000 protected assets.
mailto:[email protected]:[email protected]://www.netclarity.net/http://www.netclarity.net/http://www.netclarity.net/http://www.linkedin.com/company/130511?trk=tyahhttp://www.facebook.com/netclarityhttp://www.twitter.com/netclaritymailto:[email protected]Top Related