Last Updated on 19 Jan. 2011, Company: Mirage Networks
Mirage NAC controls access based on user identity, endpoint compliance, and behavioral policies. Identity policies allow you to determine who is allowed to access specific resources on your network. Endpoint compliance allows you to govern access based on health and status of the endpoint. Behavioral policies allow you govern access based on what any endpoint is doing on the network. Combined, these profiles give customers the most granular approach in enforcing access policies.