Network Access Control

Last Updated on 26 April 2016, Total: 13 Products

A comprehensive list of software solutions that define, control and implement secure access policies to network nodes and resources.

  1. Featured

    GFI WebMonitor

    GFI WebMonitor allows IT administrators to control internet access, reports on users' website browsing habits and downloads, while providing web security features such as antivirus and malware protection in real-time for SMEs, using multiple antivirus engines. GFI WebMonitor enables businesses to improve employee productivity and reduce cyber-slacking. Its reporting capabilities allow companies to effectively enforce an Internet usage policy because... Read More

  2. NTFS Security Management Suite 2014

    NTFS Security Management Suite 2014 offers a combined permissions auditing and management solution to Windows administrators looking to secure their networks against unauthorized access. It is a combined solution offering Windows systems administrators a package to audit, manage and upgrade the security of their Windows networks. This allows administrators to peek into the security leaks and plug them by updating... Read More

  3. UserLock

    Logins are the first line of defense for your network. UserLock provides and enforces granular rules and policies to control and secure network access. UserLock allows you to limit or prevent concurrent logins on your Windows network. You can control interactive sessions, RAS sessions, IIS sessions and set limitations per user, user group, organizational unit. UserLock also allows you to... Read More

  4. Mirage NAC

    Mirage NAC controls access based on user identity, endpoint compliance, and behavioral policies. Identity policies allow you to determine who is allowed to access specific resources on your network. Endpoint compliance allows you to govern access based on health and status of the endpoint. Behavioral policies allow you govern access based on what any endpoint is doing on the network... Read More

  5. Aruba Network Access Control

    Aruba's integrated network access control (NAC) solution offers one of the industry's most secure and fastest policy engines - the Aruba Policy Enforcement Firewall (PDF) - which delivers up to 80 Gbps of firewall capacity. Whether wired or wireless, the Aruba NAC solution enforces role-based policies that specify who, how and when users may access the network. A stateful firewall... Read More

  6. Safe Access

    Safe Access is a complete NAC solution that stops unauthorized access, prevents malicious endpoint activity, and enforces your organization's security policies. With Safe Access, you control how security policies are defined and enforced across your network. You establish and enforce the rules/criteria that devices must adhere to gain access. When devices don't meet your criteria, you have enforcement options that... Read More

  7. Symantec Network Access Control

    Symantec Network Access Control 11.0 securely controls access to corporate networks, enforces endpoint security policy and easily integrates with existing network infrastructures. Regardless of how endpoints connect to the network, Symantec's award-winning network access control solution discovers and evaluates endpoint compliance status, provisions the appropriate network access and provides automated remediation capabilities... Read More

  8. Trustwave Enterprise NAC

    Trustwave's suite of integrated appliances is a scalable full-cycle NAC solution designed to protect large enterprise networks. Trustwave offers full protection for all endpoints, managed and unmanaged, and works in any network infrastructure. Our solutions combine agent-less network access control with zero-day threat prevention and automated policy enforcement. Network intelligence provides a unified view of endpoint activity and delivers powerful... Read More

  9. ProCurve Network Access Controller 800

    The HP ProCurve Network Access Controller (NAC) 800 combines a RADIUS-based authentication server and the ability to validate the integrity of the systems connecting to the network, allowing network administrators to secure the network from unauthorized users and systems that pose a threat to network resources... Read More

  10. Bradford NAC Director

    Bradford Network's NAC Director solution set provides you with complete visibility and control of all users and devices on your network to prevent unauthorized access and keep your network secure. NAC Director registers and authenticates all users and their associated devices, monitors their access and network usage, and dynamically provisions role-based policies to ensure that users get to only the... Read More

  11. McAfee Network Access Control Appliance

    McAfee Network Access Control (NAC) Appliance manages guest and contractor access and offers inline identity and application-based NAC. The NAC Appliance delivers the same NAC features as the add-on to the McAfee Network Security Platform without the intrusion prevention system. This industry-leading platform provides out-of-band or inline NAC at line speeds ranging from 100 Mbps to 2 Gbps for 5,000... Read More

  12. IC6500 Unified Access Control Appliance

    The IC6500 Unified Access Control Appliance is the next generation of hardened, centralized network access policy management servers, delivering scalability, performance, and redundancy. Designed to address the network access needs of large multi-national organizations and government agencies, the IC6500 network access server scales to support up to 15,000 simultaneous endpoint devices. This network access server can be deployed standalone or... Read More

  13. Enterasys Network Access Control

    Enterasys Network Access Control (NAC) is a complete standards-based, multi-vendor interoperable pre-connect and post-connect Network Access Control solution. Using Enterasys NAC Inline Controller and/or NAC Out-of-Band Gateway appliances with Enterasys NMS NAC Manager configuration and reporting software, IT administrators can deploy a leading-edge NAC solution to ensure only the right users have access to the right information from the right... Read More

Featured Links